期刊文献+

一种基于攻击图的5G网络安全风险评估方法 被引量:6

A METHOD OF 5G NETWORK SECURITY RISK ASSESSMENT BASED ON ATTACK GRAPH
下载PDF
导出
摘要 为解决5G网络的安全风险评估问题,提出基于攻击图的评估框架,包括攻击图构造和风险评估两部分。给出5G网络拓扑模型和攻击模版的通用定义,可以适应网络的不同部署方式,具有灵活性。将其作为攻击图生成算法的输入条件,设定攻击者初始位置后,采用广度优先算法构造属性攻击图。该攻击图生成算法可以减少图中节点数量,来限制图的规模,防止空间爆炸。在风险评估过程中,提出漏洞关联性评估思路,以单一评估CVSS 3.0版本为基础,引入漏洞间的关联概率,量化攻击行为间的相互影响。实验结果表明,该方法能有效地评估5G网络面临的安全威胁和风险等级,有助于部署合理的安全防护措施。 model and attack template were defined,which could flexibly adapt to different network deployment modes.The above models were taken as the input conditions of attack graph generation algorithm.After setting the attacker s initial position,a breadth-first algorithm was used to construct the attribute attack graph.The algorithm could reduce the number of nodes to limit the size of the graph and prevent space explosion.During the evaluation process,based on the single assessment of CVSS 3.0,a vulnerability correlation assessment method was proposed and the correlation probability between vulnerabilities was introduced to quantify the interaction between attack behaviors.The experimental results show that the method is effective in assessing the security threats and risk level of 5G network and helpful to deploy reasonable security measures.
作者 王赛娥 刘彩霞 刘树新 Wang Saie;Liu Caixia;Liu Shuxin(People s Liberation Army Strategic Support Force Information Engineering University,Zhengzhou 450001,Henan,China)
出处 《计算机应用与软件》 北大核心 2023年第4期289-296,335,共9页 Computer Applications and Software
基金 国家自然科学基金青年科学基金项目(61803384,61801515)。
关键词 5G网络 攻击图模型 安全风险 关联评估 通用漏洞评分系统 5G network Attack graph model Security risks Association assessment CVSS
  • 相关文献

参考文献4

二级参考文献33

  • 1国家质量监督检验检疫总局.GB/T20984--2007信息安全技术信息系统的风险评估规范[S].北京:中国标准出版社,2007.
  • 2Jajodia S, Noel S. Topological vulnerability analysis: A powerful new approach for network attack prevention, de- tection, and response [ M ]//Algorithms, Architectures and Information Systems Security. Singapore: World Scientific Publishing Company ,2008:285 - 305.
  • 3Ou Xinming, Boyer W F, McQueen M A. A scalable ap- proach to attack graph generation[ C ]//Proceedings of the 13th ACM Conference on Computer and Communications Security( CCS' 06). New York : ACM ,2006:336 - 345.
  • 4Ou Xinming,Homer J,Zhang Su,et al. MulVAL project at Kansas State University[EB/OL]. (2011- 12-4) [2015- 11 - 28 ]. http ://people. cis. ksu. edu/- xou/mulval/.
  • 5Xie Peng,Li J H,Ou Xinming,et al. Using Bayesian net- works for cyber security analysis [ C ]//Proceedings of 2010 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Chicago : IEEE, 2010 : 211 - 220.
  • 6Homer J, Zhang S, Ou X, et al. Aggregating vulnerability mettles in enterprise networks using attack graphs [J]. lournal of Computer Security,2013,21(4) :561-597.
  • 7Poolsappasit N, Dewri R, Ray I. Dynamic security risk management using Bayesian attack graphs [ J ]. IEEE Transactions on Dependable and Secure Computing,2012, 9 ( 1 ) :61 - 7g.
  • 8Mell P, Scarfone K, Romanosky S. Common vulnerability scoring system [J]. IEEE Security & Privacy Magazine, 2006,4(6) :85 - 89.
  • 9张少俊,李建华,宋珊珊,李斓,陈秀真.贝叶斯推理在攻击图节点置信度计算中的应用[J].软件学报,2010,21(9):2376-2386. 被引量:29
  • 10胡欣,孙永林,王勇军.一种基于网络安全梯度的攻击图生成并行化方法[J].计算机应用与软件,2011,28(11):25-29. 被引量:2

共引文献68

同被引文献58

引证文献6

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部