期刊文献+

基于时间-概率攻击图的网络安全评估方法 被引量:2

Network Security Evaluation Method Based on Time-probability Attack Graph
下载PDF
导出
摘要 考虑漏洞利用时间和扫描时间对网络攻防对抗的影响,研究了基于时间-概率攻击图的网络安全评估方法。在概率攻击图的基础上,引入原子攻击时间、漏洞扫描时间的概念,构建时间-概率攻击图;分析攻击路径的成功概率计算方法,给出了基于时间-概率攻击图的网络安全评估方法;结合时间-概率攻击图实例,通过蒙特卡洛方法仿真验证了时间-概率攻击图中攻击路径成功概率计算方法的准确性,分析了防御系统部署位置和扫描周期对网络安全性能的影响。 Considering the influence of exploiting time and scanning time on network attack and defense,a network security assessment method based on time-probability attack graph is studied.Firstly,based on the probabilistic attack graph,the atomic attack time and vulnerability scanning time are introduced to construct the time-probabilistic attack graph. The successful probability calculation method of attack path is analyzed,and the network security evaluation method based on time-probability attack graph is given. Finally,combined with an example of time-probability attack graph,the accuracy of successful probability calculation method of attack path in the time-probability attack graph is verified by Monte Carlo simulation,and the influence of the deployment location and scanning period of the defense system on the network security performance is analyzed.
作者 仇铭阳 赛煜 王刚 孟庆微 QIU Ming-yang;SAI Yu;WANG Gang;MENG Qing-wei(Information and Navigation Institute,Air Force Engineering University,Xi’an 710077,China;Jinan Vocational College,Jinan 250101,China)
出处 《火力与指挥控制》 CSCD 北大核心 2022年第1期145-149,155,共6页 Fire Control & Command Control
关键词 时间-概率攻击图 原子攻击时间 扫描时间 安全评估 time-probability attack graph atomic attack time scanning time security evaluation
  • 相关文献

参考文献8

二级参考文献92

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2张涛,胡铭曾,云晓春,张永铮.计算机网络安全性分析建模研究[J].通信学报,2005,26(12):100-109. 被引量:41
  • 3王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:57
  • 4Cunningham W H. Optimal Attack and Reinforcement of a Network [J] .Journal of the ACM (JACM), 1985, 32(3): 549- 561. 被引量:1
  • 5Kuang R B. Rule Based Security Checking[R]. Technical Report, MIT lab for Computer Science, 1994. 被引量:1
  • 6Swiler L P, Phillips C, Gaylor T.A Graph Based Network Vulnerability Analysis System, SAND97- 3010/1[R]. Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, 1998. 被引量:1
  • 7Ritchey R W, AmmannP. Using Model Checking to Analyze Network Vulnerabilities[ C]//Proceedings of the IEEE Computer Society Syraposium on Security and Privacy(S&P 2000), Oakland, California, 2000:156 - 165. 被引量:1
  • 8Jha S, Sheyner O, Wing J. Two Formal Analyses of Attack Graphs[ C]//Proceedings of the 15^th IEEE Computer Security Foundations Workshop (CSFW'15), Cape Breton, Nova Scotia, Canada, 2002: 49-63,. 被引量:1
  • 9Sheyner O, Haines J, Jha S, et al. Automated Generation and Analysis of Attack Graphs[ C]//Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P 2002), Oakland, California, 2002: 254- 265. 被引量:1
  • 10Ammann P, Wijesekem D, Kaushik S. Scalable, Graph-based Network Vulnerability Analysis[C]//Proceedings of the 9^th ACM Conference on Computer and Communications Security (CCS'02), Washington DC, ACM, 2002: 217-224. 被引量:1

共引文献183

同被引文献19

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部