期刊文献+

面向网络实时对抗的动态防御决策方法 被引量:2

Dynamic defense decision method for network real-time confrontation
下载PDF
导出
摘要 如何基于网络外在威胁实施防御决策是构建网络信息防御体系的核心问题,针对实时攻击带来的动态威胁进行科学有效的防御决策是构建网络动态应急防御体系的关键。针对动态防御决策问题,首先基于属性攻击图理论设计了一种网络生存性博弈模型,利用攻防矩阵表示攻防策略和路径,并给出了攻防强度和网络生存性量化方法;其次提出了单步与多步的攻、防策略支出计算方法,并基于攻防策略支出给出防御决策;最后通过实验进行防御决策技术的有效性验证。 How to implement defense decision based on network external threat is the core problem of building network information defense system. Especially for the dynamic threat brought by real-time attack, scientific and effective defense decision is the key to construct network dynamic emergency defense system. Aiming at the problem of dynamic defense decision-making, firstly a network survivability game model based on attribute attack graph theory is designed. The attack and defense matrix is used to represent the attack and defense strategy and path, and the attack and defense strength and network survivability quantification method are given. Secondly, the single step and the multi-step attack and defense strategy payoff calculation method is proposed, and the defense decision is based on the attack and defensive strategy payoff. Finally, the effectiveness of the defense decision technology is verified through experiments.
作者 冷强 杨英杰 常德显 潘瑞萱 蔡英 胡浩 LENG Qiang;YANG Yingjie;CHANG Dexian;PAN Ruixuan;CAI Ying;HU Hao(Information Engineering University,Zhengzhou 450001,China;Henan Polytechnic University,Zhengzhou 450001,China)
出处 《网络与信息安全学报》 2019年第6期58-66,共9页 Chinese Journal of Network and Information Security
基金 国家自然科学基金资助项目(No.61902427) 国家高技术研究发展计划(“863”计划)基金资助项目(No.2015AA016006) 国家重点研发计划基金资助项目(No.2016YFF0204003) “十三五”装备预研领域基金资助项目(No.61400020201)
关键词 属性攻击图 网络生存性 网络攻防对抗 攻防强度 attribute attack graph network survivability network attack-defense confrontation attack-defense strength
  • 相关文献

参考文献5

二级参考文献50

  • 1诸葛建伟,韩心慧,叶志远,邹维.基于扩展目标规划图的网络攻击规划识别算法[J].计算机学报,2006,29(8):1356-1366. 被引量:17
  • 2王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:56
  • 3王永杰,江亮,鲜明,陈志杰,王国玉.网络攻击效果在线评估模型与算法研究[J].计算机科学,2007,34(5):72-74. 被引量:6
  • 4Liu Peng, Zang Wan-yu, and Yu Meng. Incentive-based modeling and inference of attacker intent, objectives, and strategies [J]. A CM Transactions on Information and System Security, 2005, 8(1): 78-118.
  • 5Jiang Wei, Fang Bin-xing, Zhang Hong-li, et al.. Optimal network security strengthening using attack-defense game model[C]. Proceedings of the 6th International Conference on Information Technology: New Generation ITNG 2009, Las Vegas, Nevada, USA, 2009: 475-480.
  • 6Wang Wei and Daniels E. A graph based approach toward network forensics analysis [J]. ACM Transactions on Information and System Security, 2008, 12(1): 1-33.
  • 7Wen Dan-yan, Ji Yi, Li Xiao-jian, et al.. A multiple criteria decision making model for CNO attack scheme evaluation[C]. International Conference on Computational Intelligence and Software Engineering, Wuhan, China, 2009: 1-7.
  • 8Qiu Xiang-qun and Paterson R. An innovative network security vulnerability modeling method and tool[J]. IEEE Communications Magazine, 2010, 48(1): 104-108.
  • 9Rodolphe O, Yves D, and Mohamed K. Experimenting with quantitative evaluation tools for monitoring operational security[J]. IEEE Transactions on Software Engineering, 1999 25(5): 633-651.
  • 10Kijsanayothin P and Hewett R. Analytical approach to attack graph analysis for network security[C]. International Conference on Availability, Reliability and Security, Krakow, Poland. 2010: 25-32.

共引文献71

同被引文献5

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部