北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2015, Vol. 38 ›› Issue (1): 82-86.doi: 10.13190/j.jbupt.2015.01.016

• 研究报告 • 上一篇    下一篇

一种基于目标攻击图的态势威胁评估方法

刘威歆1, 郑康锋1, 胡影2, 武斌1   

  1. 1. 北京邮电大学 信息安全中心, 北京 100876;
    2. 武警北京指挥学院, 北京 100012
  • 收稿日期:2014-04-01 出版日期:2015-02-28 发布日期:2015-03-30
  • 作者简介:刘威歆(1987—),男,博士生,E-mail:jack18jack@gmail.com;郑康锋(1975—),男,副教授,博士生导师.
  • 基金资助:

    国家自然科学基金青年科学基金项目(61101108)

Approach of Goal-Oriented Attack Graph-Based Threat Evaluation for Network Security

LIU Wei-xin1, ZHENG Kang-feng1, HU Ying2, WU Bin1   

  1. 1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China;
    2. Armed Police Beijing Command Academy, Beijing 100012, China
  • Received:2014-04-01 Online:2015-02-28 Published:2015-03-30

摘要:

针对传统安全威胁评估方法难以理解攻击渗透的相关性,且难以量化相关渗透对于网络环境的影响问题,结合攻击图渗透动作危害性、渗透相关性和主机业务重要性,提出双向威胁评估模型和计算方法,能衡量攻击的深入程度和对目标的威胁程度,最后提出了一个能应用于实时告警分析的攻击序列评估方法,并通过实验验证了所提模型的合理性和有效性.

关键词: 威胁评估, 攻击图, 双向威胁评估

Abstract:

For being not falling in as final targets of attackers, the critical resources in network environments should be protected. It is vital to quantify the threat and impact during the process of multi-stage attacks. Aiming at combine threat quantification of individual attack action and significance value of hosts, as well as large amount of attack dependencies in attack graphs, a methodology for threat evaluation was proposed. The bi-directional threat evaluation presented in this article is able to compute progress attackers already, as well as the threat to goal-resources in attack graph, which can be well applied to real-time attack threat evaluation. The proposed was finally verified in experiment and simulation.

Key words: threat situation, attack graph, bi-directional threat evaluation

中图分类号: