期刊文献+

基于攻防博弈模型的网络安全测评和最优主动防御分析 被引量:2

Analysis of Network Security Measurement and Optimal Active Defense Based on Offensive and Defensive Game Models
下载PDF
导出
摘要 介绍了网络上的信息安全测评和进行主动防御的策略,基于攻防博弈模型建立网络防御机制,对网络攻防策略进行分类,并对其攻防成本进行量化式处理,通过对经典攻防博弈模型的论述进行基于网络攻防博弈的分析,从而进行网络安全测评,并通过网络安全示例来解释该模型与算法在网络安全测评和最优主动防御策略的选取过程中的重要性与实际效果,从而证实基于攻防博弈模型的网络安全测评和最优主动防御策略是切实可行且有效的。 Information security measurement and strategies for conducting active defense on the network are introduced,a network defense mechanism is established based on the offensive and defensive game model,network offensive and defensive strategies are classified,and their offensive and defensive costs are treated quantitatively,an analysis based on the network offensive and defensive game is conducted through a discussion of the classical offensive and defensive game model so as to conduct network security measurement,and a network security example is used to explain the role of the model and algorithm in The importance and effectiveness of the model and algorithm in the process of network security assessment and selection of optimal active defence strategies are explained through a network security example,thus confirming that network security assessment and optimal active defence strategies based on the attack and defence game model are practical and effective.
作者 唐泽林 王晓莉 王新 Tang Zelin;Wang Xiaoli;Wang Xin(Yangtze River Three Gorges Navigation Administration,Yichang Hubei 443000)
出处 《现代工业经济和信息化》 2023年第2期74-75,共2页 Modern Industrial Economy and Informationization
关键词 攻防博弈 网络安全 主动防御 信息安全 offensive and defensive games network security active defence information security
  • 相关文献

参考文献2

二级参考文献13

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3Dacier M.. Towards quantitative evaluation of computer security[Ph. D. dissertation]. Institut National Polytechnique de Toulouse, 1994
  • 4Dacier M. , Deswarte Y. , Kaniche M.. Quantitative assessment of operational security: Models and tools. LAAS: Technical Report 96493, 1996
  • 5Ortalo R. , Deswarte Y.. Information systems security: Specification and quantitative evaluation. In: DeVa ESPRIT Long Term Research Project No. 20072-2nd Year Report, 1997, 561-584
  • 6Ortalo R. , Deswarte Y. , Kaniche M.. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 1999, 25(5):633-650
  • 7Phillips C. , Swiler L.. A graph-based system for network vulnerability analysis. In, Proceedings of the ACM New Security Paradigms Workshop, 1998, 71-79
  • 8Sheyner O.. Scenario graphs and attack graphs[Ph. D. dissertation]. Carnegie Mellon University, 2004
  • 9Jha S. , Sheyner O. , Wing J.. Two formal analyses of attack graphs. In: Proceedings of the 2002 Computer Security Foundations Workshop, Nova Scotia, 2002, 45-59
  • 10Sheyner O. , Haines J. , Jha S. , Lippmann R. , Wing J. M..Automated generation and analysis of attack graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, 2002

共引文献96

同被引文献12

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部