期刊文献+

一种面向任务的网络风险评估模型 被引量:1

A Network Risk Assessment Model Geared to the Needs of Tasks
下载PDF
导出
摘要 针对网络业务安全风险评估问题,提出了一种基于STRIDE威胁建模和隐式马尔科夫模型理论的STRIDE-HMM风险评测方法,该方法以网络业务为切入点,给出了任务描述模型、任务资产模型、任务风险评估模型的构建方法及其联系。任务描述模型给出了任务阶段划分及相应的资产集、漏洞集和威胁集;任务资产模型给出了任务各阶段所依赖的资产集合,在此基础上采用隐式马尔科夫模型方法给出了资产安全状态量化计算方法;任务风险评估模型按照资产分类集合的结果,采用聚合分析方法给出了任务风险值计算方法,进而实现面向网络业务的风险评测。为了验证提出方法的有效性,采用TMT威胁建模工具典型web应用给出的资产、漏洞、威胁示例,利用提出的模型和方法对该示例进行了仿真验证,实验结果表明:该方法可为面向任务的安全计划制定和调度提供决策支持。 In view of network business security risk assessment problems,a STRIDE-HMM network risk assessment and prediction method based on STRIDE threat modeling and HMM theory is proposed.Taking the network service as an entry point,the construction method of the task description model,the task asset model and the task risk assessment model and the relationship are given among them.The task description model gives the task phase partitioning and corresponding asset sets,vulnerability sets,and threat sets;The task asset model gives a set of assets depended on each stage of the task.On the basis of this,HMM is used to give the quantitative calculation method of asset security status.The task risk assessment model realizes the risk assessment for network business by using aggregation analysis method to achieve the task risk value calculation method according to the results of the asset classification set.To verify the effectiveness of the proposed method,a typical web application example of assets,vulnerabilities and threats combined with threat modeling tool TMT is given.The result proves that the proposed method can provide decision support for the security planning and scheduling oriented to the needs of tasks.
作者 孙奥 殷肖川 李小青 SUN Ao;YIN Xiaochuan;LI Xiaoqing(Information and Navigation College,Air Force Engineering University,Xi’an 710077,China)
出处 《空军工程大学学报(自然科学版)》 CSCD 北大核心 2019年第5期105-110,共6页 Journal of Air Force Engineering University(Natural Science Edition)
基金 国家自然科学基金(71503260)
关键词 面向任务 风险评估 威胁建模 风险预测 task-oriented risk assessment threat modeling risk prediction
  • 相关文献

参考文献6

二级参考文献22

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2Michael H, David L. Writing Secure Code[M]. Redmond, Washington, USA: Microsoft Press, 2003. 被引量:1
  • 3Dewri R, Poolsappasit N, Ray I, et al. Optimal Security Hardening Using Multi-objective Optimization on Attack Tree Models of Networks[C]//Proc. of CCS'07. Alexandria, Virginia, USA:[s. n.], 2007. 被引量:1
  • 4Gran B A, Fredriksen R, Thunem A P J. Addressing Dependability by Applying an Approach for Model-based Risk Assessment[J]. Reliability Engineering & System Safety, 2007, 92(11):1492-1502. 被引量:1
  • 5Li Xiaohong, He Ke. A Unified Threat Model for Assessing Threat in Web Applications[C]//Proc. of the 2nd International Conference on Information Security and Assurance. Busan, Korea: [s. n.], 2008. 被引量:1
  • 6Clark K,Dawkins J,Hale J.Security risk metrics:fusion enterprise objectives and vulnerabilities[C]//Proceedings of the IEEE Workshop on Information Assurance and Security,United States Military Academy,West Point,NY,2005. 被引量:1
  • 7Swanson M,Bartol N.Sabaro J,et al.Security metrics guide for information technology systems 800-55[S].National Institute for Standards Publication,July 2003. 被引量:1
  • 8lnfosec assessment methodology[R/OL].National Security Agency.http://www.iatrp.com/iam.cfm. 被引量:1
  • 9张红旗,王新昌,杨英杰.信息安全管理[M].北京:人民邮电出版社,2008:76-78. 被引量:2
  • 10CHEN Jianli.A social benefit comprehensive evaluation model base on unascertained measure expectation of science and technology information products[C] //ICICA2012.Chengde,China:Springer,2012:833-839. 被引量:1

共引文献29

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部