期刊文献+

基于多元信息融合的网络威胁动态评估 被引量:10

A Dynamic Network Threat Assessment Method Based on Multi-Source Information Fusion
下载PDF
导出
摘要 威胁评估是根据网络环境、脆弱性、攻击行为、防护措施等信息预测和评估攻击者的入侵意图和攻击行为的过程。针对网络信息的多源性和复杂性,提出了一种基于多源信息融合理论和方法的网络威胁动态评估方法。该方法在攻击图的基础上,通过分析脆弱性的利用难度来定义攻击状态之间的转换概率,应用D-S证据理论融合入侵检测系统的报警得到攻击者的攻击行为和攻击者的能力,最终预测攻击者的攻击意图以及攻击规则,并对网络威胁进行量化分析。实验验证了该方法的可行性和有效性。 Threat assessment is a process of prediction and estimation intrusive intention and attack action of an attacker according to network configurations,vulnerabilities,attack actions,safeguards and so on.Because of the variety and complexity of network information,a novel network threat assessment method based on multi-source fusion theory is proposed in this paper. On the basis of attack graph,the probabilities of attack state transition is defined by the difficulty analysis of vulnerability exploit. Then applying DS evidence theory,attack actions and capabilities of the attacker are obtained from alerts of intrusion detection system. Finally,intrusive intentions and attack plans can be projected through this method. The experimental results also prove the validity of the algorithm.
出处 《中国电子科学研究院学报》 北大核心 2016年第3期250-256,共7页 Journal of China Academy of Electronics and Information Technology
关键词 威胁评估 攻击路径 D-S证据理论 马尔可夫过程 threat assessment attack path D-S evidence theory Markov process
  • 相关文献

参考文献11

  • 1Steinberg Alan N. An Approach to Threat Assessment 7th International Conference on Information Fusion [ M] 2005 : 1256-1263.
  • 2Bass T. Intrusion systems and muhisensor data fusion Creating cyberspace situational awareness. Commnnica- tions of the ACM [J]. 2000, 43(4): 99-105.
  • 3Holsopple J and Yang S J. FuSIA: Future Situation and Impact Awareness. llth ISIF/IEEE International Confer- ence on Information Fusion [ M ]. Cologne, Germany, Julyl-3, 2008.
  • 4Yang S J, Stotz A, Holsopple J et al. High Level Infor- mation Fusion for Tracking and Projection of Multistage Cyber Attacks. International Journal on Information Fu- sion [J]. 2009, 10(1):107-121.
  • 5Shen D, Chen G, Blasch E et al. Adaptive Markov Game Theoretic Data Fusion Approach for Cyber Network De- fense. IEEE Conference on Military Communications [ M] , October, 2007.
  • 6陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 7张海霞,连一峰,苏璞睿,冯登国.基于安全状态域的网络评估模型[J].软件学报,2009,20(2):451-461. 被引量:19
  • 8Sheyner O, Haines J, Jha Set al. Automated Generation and Analysis of Attack Graphs. Proceedings of the 2002 IEEE Symposium on Security and Privacy [ M ]. Oak- land, CA, 2002: 273-284.
  • 9张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 10彭武,胡昌振,姚淑萍,王志刚.基于时间自动机的入侵意图动态识别方法[J].计算机研究与发展,2011,48(7):1288-1297. 被引量:4

二级参考文献32

共引文献384

同被引文献94

引证文献10

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部