期刊文献+

基于贝叶斯网络d-分隔定理的节点置信度计算方法

NODE CONFIDENCE CALCULATION METHOD BASED ON D-SEPARATION THEOREM OF BAYESIAN NETWORK
下载PDF
导出
摘要 现有的贝叶斯网络节点置信度计算方法,存在着因条件概率的错误计算和节点的相关性导致的节点置信度错误计算问题。这些问题降低了节点置信度的准确性,影响了网络威胁传播路径预测的有效性。为此,提出基于贝叶斯网络d-分隔定理的节点置信度计算方法。首先,通过分析攻击成本和攻击行为发生的可能性之间的关系,提出攻击行为发生的条件概率计算方法,以解决条件概率的错误计算问题;其次,通过引入贝叶斯网络分隔定理,使存在关联性的节点在它们共有的d-分隔集合条件下相互独立,并提出节点置信度的计算方法,以有效地避免相关性导致的节点置信度错误计算;最后,实验结果表明,该方法有效地解决了节点置信度的错误计算问题,提高了节点置信度的准确性,实现了对网络威胁传播路径的有效预测。 Current node confidence calculation method for Bayesian network has the problem of node confidence miscalculation caused by the miscalculation of conditional probability and the correlation of nodes. This problem reduces the accuracy of node confidence and impacts the effectiveness of prediction on propagation paths of network threats. Therefore,we present a node confidence calculation method which is based on d-separation theorem of Bayesian network. First,by analysing the correlation between attack cost and the occurrence likelihood of attack activity,we propose an approach for calculating the conditional probability of attack activity occurrence so as to solve the problem of miscalculation in conditional probability. Secondly,by introducing separation theorem of Bayesian network,we make the nodes with correlation be independent to each other under the condition of their common d-separation set,and propose the node confidence calculation method so as to effectively avoid the miscalculation of node confidence caused by the correlation. Finally,experimental results show that our method effectively solves the miscalculation problem of node confidence and improves the accuracy of node confidence,consequently it achieves the effective prediction on propagation paths of network threats.
出处 《计算机应用与软件》 CSCD 2016年第11期288-296,共9页 Computer Applications and Software
基金 国家自然科学基金项目(51174263 61300216) 教育部博士点基金项目(20124116120004) 河南省教育厅科学技术研究重点项目(13A510325)
关键词 节点置信度 条件概率 相关性 d-分隔 攻击成本 Node confidence Conditional probability Correlation d-Separation Attack cost
  • 相关文献

参考文献9

二级参考文献126

  • 1冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:30
  • 2王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:56
  • 3Swiler LP,Phillips C,Gaylor T.A graph-based network-vulnerability analysis system.Technical Report,SANDIA Report No.SAND 97-3010/1,1998.
  • 4Swiler LP,Phillips C,Ellis D,Chakerian S.Computer-Attack graph generation tool.In:Proc.of the 2nd DARPA Information Survivability Conf.& Exposition.Los Alamitos:IEEE Computer Society Press,2001.307-321.
  • 5Lippmann RP,Ingols KW.An annotated review of past papers on attack graphs.Technical Report,ESC-TR-2005-054,MIT Lincoln Laboratory,2005.
  • 6Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities.In:Proc.of the 2000 IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2000.156-165.
  • 7Sheyner O,Jha S,Wing JM,Lippmann RP,Haines J.Automated generation and analysis of attack graphs.In:Hinton H,Blakley B,Abadi M,Bellovin S,eds.Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2002.273-284.
  • 8Jha S,Sheyner O,Wing J.Two formal analyses of attack graphs.In:Proc.of the 15th IEEE Computer Security Foundations Workshop.Cape Breton:IEEE Computer Society,2002.49-63.
  • 9Ou XM,Boyer WF,McQueen MA.A scalable approach to attack graph generation.In:Proc.of the 13th ACM Conf.on Computer and Communications Security.Alexandria:ACM Press,2006.336-345.
  • 10Ou XM.A logic-programming approach to network security analysis[Ph.D.Thesis].Princeton:Princeton University,2005.

共引文献146

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部