中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 期刊论文
Subject: Computer Science (provided by Thomson Reuters)
Title:
一种基于攻击图的安全威胁识别和分析方法
Alternative Title: a security threats identification and analysis method based on attack graph
Author: 吴迪 ; 连一峰 ; 陈恺 ; 刘玉岭
Keyword: 攻击模型 ; 网络攻击图 ; 子攻击图 ; 颜色Petri网 ; 不确定性推理 ; D-S证据理论
Source: 计算机学报
Issued Date: 2012
Volume: 35, Issue:9, Pages:1938-1950
Indexed Type: CNKI ; EI ; WANFANG ; CSCD
Department: 中国科学院软件研究所;中国科学院研究生院;信息网络安全公安部重点实验室(公安部第三研究所);信息安全共性技术国家工程研究中心;
Sponsorship: 国家“八六三”高技术研究发展计划项目基金(2009AA01Z439,2011AA01A203)|国家自然科学基金(61100226)|北京市自然科学基金(4122085)|信息网络安全公安部重点实验室(公安部第三研究所)开放基金(C10606)资助
Abstract: 业务系统安全管理需要网络攻击图来评估系统整体安全性或态势,同时又需要对那些可能严重危害系统安全的脆弱性利用威胁进行重点分析和优先处置.现有安全威胁识别和分析方法无法兼顾这两个方面,也无法处理脆弱性利用威胁分析过程中的不确定性问题.作者提出了一种安全威胁识别和分析方法.利用颜色Petri网(CPN)定义网络攻击图,并给出了网络攻击图生成NAGG算法,根据攻击模型分析结果生成网络攻击图;给出了基于CPN仿真的网络攻击图分解NAGD算法,可一次性分解出各脆弱性利用威胁对应的子攻击图,所述子攻击图不存在循环路径且最长攻击路径不超过预设值.并给出了一种脆弱性利用威胁度评估VETE算法,将子攻击图转换为不确定性推理规则集,采用D-S证据推理计算各子攻击图所对应安全威胁的威胁度,以确定安全威胁处置优先级.最后以一个典型Web应用系统为例,验证了所述安全威胁识别和分析方法的有效性.
English Abstract: Business system's security management needs to assess the system security situation by using network attack graph. It also needs to analyze the threats exploiting security vulnerabilities. Current security threat identification and analysis methods cannot handle the upper two problems very well at the same time. It cannot handle uncertainties occurred in the process of vulnerability exploiting threat analysis, either. A security threat identification and analysis method is proposed in this paper. The network attack graph is defined via Colored Petri Net (CPN) and an algorithm named NAGG is proposed to construct network attack graph based on the simulation results. We also give an algorithm named NAGD to simultaneously decompose network attack graph into several sub-attack-graphs, each corresponding to a specific vulnerability exploiting threat. The graph is loop-free and its longest attack path is limited to a certain predefined value. In order to prioritize all security threats for disposal, a vulnerability exploiting threat evaluating method named VETE is given to convert sub-attack graph into uncertain inference rule set. This method uses D-S evidence inference engine to calculate threat degree of each threat corresponding to the sub-attack-graph. At last, a typical Web application system is used as an example to validate the effectiveness of the proposed method.
Language: 中文
Citation statistics:
Content Type: 期刊论文
URI: http://ir.iscas.ac.cn/handle/311060/14976
Appears in Collections:软件所图书馆_期刊论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
吴迪,连一峰,陈恺,等. 一种基于攻击图的安全威胁识别和分析方法[J]. 计算机学报,2012-01-01,35(9):1938-1950.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[吴迪]'s Articles
[连一峰]'s Articles
[陈恺]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[吴迪]‘s Articles
[连一峰]‘s Articles
[陈恺]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace