期刊文献+

基于贝叶斯攻击图的电子政务系统风险评估方法研究 被引量:1

Research on Risk Assessment Method of E-government System Based on Bayesian Attack Diagram
下载PDF
导出
摘要 为了提升电子政务系统风险评估的效果,从资产、威胁、脆弱性三个方面入手,将攻击图理论和贝叶斯理论相结合,提出一种适用于电子政务系统的动态风险评估模型。运用文章所提方法分析系统整体安全态势,最终找到攻击者最有可能的攻击路径,增强电子政务系统面对网络攻击动态防御的能力。 In order to improve the effect of e-government system risk assessment,this paper combines attack graph theory with Bayesian theory from three aspects of assts,threats and vulnerability,and proposes a dynamic risk assessment model for e-government system.With the method proposed in this paper,the overall security situation of the system is analyzed,and the most possible attack path is found,which can effectively enhance the dynamic defense capability of e-government system in the face of network attacks.
作者 束红 黄永青 程予希 潘峻岚 Shu Hong;Huang Yong-qing;Cheng Yu-xi;Pan Jun-lan(Tongling University,Tongling Anhui 244061,China)
机构地区 铜陵学院
出处 《铜陵学院学报》 2019年第3期107-110,共4页 Journal of Tongling University
基金 安徽高校省级自然科学研究项目“电子政务信息安全风险评估方法研究”(KJ2012Z411) 安徽省高等学校省级质量工程项目“数学建模教学团队”(2018jxtd008)
关键词 电子政务系统 风险评估 贝叶斯攻击图 e-government system risk assessment Bayesian attack map
  • 相关文献

参考文献5

二级参考文献42

  • 1刘奇旭,张翀斌,张玉清,张宝峰.安全漏洞等级划分关键技术研究[J].通信学报,2012,33(S1):79-87. 被引量:36
  • 2程叶霞,姜文,薛质,程叶坚.基于攻击图模型的多目标网络安全评估研究[J].计算机研究与发展,2012,49(S2):23-31. 被引量:9
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 4Phillips C, Swiler L P. A graph-hased system for network- vulnerability analysis [C] //Proc of the 1998 Workshop on New Security Paradigms. New York: ACM, 1998:71-79.
  • 5Swiler L P, Phillips C, Ellis D, et al. Computerattack graph generation tool [C] //Proe of DARPA Information Survivability Conf. Piscataway, NJ: IEEE, 2001: 307-321.
  • 6Jha S, Sheyner O, Wing J. Two formal analyses of attack graphs [C] //Proc of Computer Security Foundations Workshop. Piscataway, NJ: IEEE, 2002: 49-63.
  • 7Ammann P, Wijesekera D, Kaushik S. Scalable, graph- based network vulnerability analysis [C] //Proc of the 9th ACM Conf on Computer and Communications Security. New York: ACM, 2002:217-224.
  • 8Sheyne O, Haines J, Jha S, et al. Automated generation and analysis of attack graphs [C] //Proc of IEEE Syrup on Security and Privacy. Los Alamitos, CA: IEEE Computer Sciety, 2002:273-284.
  • 9Wang Lingyu, Yao Chao, Singhal A, et al. Interactive analysis of attack graphs using relational queries [C] //Proc of the 20th Annual IFIP Working Conf on Data Applications Security. Berlin: Springer, 2006:119-132.
  • 10Ingols K, Chu M, Lippmann R, et al. Modeling modern network attacks and counter measures using attack graphs [C] //Proc of Computer Security Applications Conf. Piscataway, NJ: IEEE, 2009:117-126.

共引文献50

同被引文献5

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部