期刊文献+

基于贝叶斯攻击图的油气生产物联网系统风险评估

Risk assessment of oil and gas production IoT system based on Bayesian attack graph
下载PDF
导出
摘要 针对油气生产物联网系统动态风险评估问题,提出一种基于贝叶斯攻击图的油气生产物联网系统风险评估模型。首先通过对系统进行风险分析,得到入侵证据及系统漏洞,结合入侵证据和漏洞利用成功概率,采用EM算法对训练数据进行数据补全并动态更新贝叶斯攻击图的条件概率参数表,通过条件概率表可计算得出先验概率,结合入侵证据计算得到节点的后验概率,进而得到系统的风险值,考虑资源利用的相关性对风险值进行最终修正。仿真结果分析证明了该模型的有效性和准确性。 Aiming at the dynamic risk assessment of oil and gas production IoT system,a risk assessment model of oil and gas production IoT system based on Bayesian attack graph was proposed.Firstly,through the risk analysis of the system,the intrusion evidence and system vulnerabilities are obtained,combined with the intrusion evidence and the success probability of vulnerability exploitation,the EM algorithm is used to complete the data of the training data and dynamically update the conditional probability parameter table of the Bayesian attack graph,the prior probability can be calculated through the conditional probability table,and the posterior probability of the node is calculated by combining the intrusion evidence,then the risk value of the system is obtained,and the risk value is finally corrected considering the correlation of resource utilization.The simulation results have proved the effectiveness and accuracy of the model.
作者 刘子龙 周纯杰 胡晓娅 曹德舜 李娜 Liu Zilong;Zhou Chunjie;Hu Xiaoya;Cao Deshun;Li Na(School of Artificial Intelligence and Automation,Huazhong University of Science and Technology,Wuhan 470074,China;Research Institute of Huazhong University of Science and Technology in Shenzhen,Shenzhen 518057,China;SINOPEC Research Institute of Safety Engineering Co.,Qingdao 266000,China)
出处 《网络安全与数据治理》 2024年第4期3-11,23,共10页 CYBER SECURITY AND DATA GOVERNANCE
基金 深圳市科技计划(JCYJ20230807143613028)。
关键词 贝叶斯攻击图 贝叶斯参数学习 风险值计算 风险值修正 Bayesian attack diagram Bayesian parameter learning value-at-risk calculation risk value correction
  • 相关文献

参考文献9

二级参考文献72

  • 1田野,谢永忠.公安信息网络系统安全分析与管理策略[J].网络安全技术与应用,2004(9):55-57. 被引量:8
  • 2赵冬梅,张玉清,马建峰.网络安全的综合风险评估[J].计算机科学,2004,31(7):66-69. 被引量:23
  • 3陈为化,江全元,曹一家.基于神经网络集成的电力系统低电压风险评估[J].电网技术,2006,30(17):14-18. 被引量:22
  • 4Computer Technology Associates. Information security: network assessment white paper [EB/OL]. [2002-06-14]. http://www.cta. com/content/docs/Net_Ass.
  • 5SAHA D. Extending logical attack graph for efficient vulnerabili- ty analysis [C]// Proceedings of 15th ACM Conference on Com- puter and Comm. Security. New York, USA: ACM, 2008: 63-74.
  • 6DEWRI R, POOLSAPPASITN, RAY I, et al. Optimal security hardening using multi-objective optimization on attack tree models of networks [C]// Proc. 14th ACM Conf. Computer and Comm. Security. [S.1.]: ACM, 2007: 204-213.
  • 7JAJODIA Sushil, NOEL Steven. Topological vulnerability analy- sis [J]. Advances in Information Security, 2010, 46(4). 139-154.
  • 8SCHIFFMAN M. Common vulnerability scoring system (CVSS) [EB/OL]. [2007-06-20]. http ://www.first.org/cvss/cvss-guide.
  • 9国家质量监督检验检疫总局.GB/T20984--2007信息安全技术信息系统的风险评估规范[S].北京:中国标准出版社,2007.
  • 10Jajodia S, Noel S. Topological vulnerability analysis: A powerful new approach for network attack prevention, de- tection, and response [ M ]//Algorithms, Architectures and Information Systems Security. Singapore: World Scientific Publishing Company ,2008:285 - 305.

共引文献102

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部