删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

基于属性攻击图的网络动态威胁分析技术研究

本站小编 Free考研考试/2022-01-03

杨英杰,
冷强,,
常德显,
潘瑞萱,
胡浩
信息工程大学 郑州 450001
基金项目:国家“863”高技术研究发展计划(2015AA016006),国家重点研发计划课题(2016YFF0204003),国家自然科学基金(61471344)

详细信息
作者简介:杨英杰:男,1971年生,教授,研究方向为信息安全
冷强:男,1993年生,硕士生,研究方向为信息安全风险评估
常德显:男,1977年生,副教授,研究方向为信息安全
潘瑞萱:女,1995年生,硕士生,研究方向为SDN网络协议安全
胡浩:男,1989年生,讲师,研究方向为网络安全态势感知和图像秘密共享
通讯作者:冷强 lqsly1993@163.com
中图分类号:TP393

计量

文章访问数:1702
HTML全文浏览量:927
PDF下载量:49
被引次数:0
出版历程

收稿日期:2018-11-07
修回日期:2019-03-25
网络出版日期:2019-04-22
刊出日期:2019-08-01

Research on Network Dynamic Threat Analysis Technology Based on Attribute Attack Graph

Yingjie YANG,
Qiang LENG,,
Dexian CHANG,
Ruixuan PAN,
Hao HU
Information Engineering University, Zhengzhou 450001, China
Funds:The National High Technology Research and Development Program of China (2015AA016006), The National Key Research and Development Program of China (2016YFF0204003), The National Natural Science Foundation of China (61471344)


摘要
摘要:该文首先利用属性攻击图理论构建了网络动态威胁分析属性攻击图(DT-AAG)模型,该模型在全面刻画系统漏洞和网络服务导致的威胁转移关系的基础上,结合通用漏洞评分标准(CVSS)和贝叶斯概率转移计算方法设计了威胁转移概率度量算法;其次基于构建的DT-AAG模型,利用威胁与漏洞、服务间的关联关系,设计了动态威胁属性攻击图生成算法(DT-AAG-A),并针对生成的属性攻击图存在的威胁传递环路问题,设计了环路消解机制;最后通过实验验证了该模型和算法的有效性。
关键词:属性攻击图/
威胁转移/
通用漏洞评分标准/
传递环路
Abstract:Firstly, a network Dynamic Threat Attribute Attack Graph (DT-AAG) analysis model is constructed by using Attribute Attack Graph theory. On the basis of the comprehensive description of system vulnerability and network service-induced threat transfer relationship, a threat transfer probability measurement algorithm is designed in combination with Common Vulerability Scoring System (CVSS) vulnerability evaluation criteria and Bayesian probability transfer method. Secondly, based on the model, a Dynamic Threat Attribute Attack Graph generation Algorithm (DT-AAG-A) is designed by using the relationship between the threat and the vulnerability as well as the service. What’s more, to solve the problem that threat transfer loop existing in the generated attribute attack graph, the loop digestion mechanism is designed. Finally, the effectiveness of the proposed model and algorithm is verified by experiments.
Key words:Attribute Attack Graph (AAG)/
Threat to transfer/
Common Vulerability Scoring System (CVSS) scoring standard/
Transfer loop



PDF全文下载地址:

https://jeit.ac.cn/article/exportPdf?id=98dd7608-fb62-489b-bce7-a7439e6b35fa
相关话题/设计 网络 概率 实验 信息工程