摘要
分析网络动态防御体系下的主机安全威胁必须考虑动态变换给主机脆弱性造成的不确定性。为此,首先,利用随机抽样模型对网络动态防御变换周期和变换空间给主机脆弱性造成的不确定性进行量化,并结合通用漏洞评分系统CVSS(common vulnerability scoring system)计算入侵者针对单个脆弱性的入侵成功概率;其次,为避免多脆弱性情况下的入侵路径搜索过程出现自环,引入节点访问队列并提出改进的递归深度优先入侵路径搜索算法;然后基于求得的脆弱性入侵成功概率计算多脆弱性多入侵路径情况下的主机安全威胁度;最后,在典型网络动态防御环境中进行实验,验证了方法的可用性和有效性。
Calculating the host security threat in network dynamic defense(NDD) situation has to consider the vulnerabilities' uncertainty because of dynamic mutation. Firstly, the vulnerabilities' uncertainty caused by the mutation space and the mutation period was calculated by random sampling model, and combined with the CVSS, the attack success probability formula of single vulnerability was derived. Secondly, to avoid self-loop during the path searching process in multiple vulnerabilities situation, an improved recursive depth first algorithm which combined with node visited queue was proposed. Then, the host security threat was calculated based on attack success probability in the situation of multiple vulnerabilities and paths. Finally, approach's availability and effectiveness were verified by an experiment conducted in a typical NDD situation.
引文
[1]蔡桂林,王宝生,王天佐,等.移动目标防御技术研究进展[J].计算机研究与发展,2016,53(5):968-987.CAI G L,WANG B S,WANG T Z,et al.Research and development of moving target defense technology[J].Journal of Computer Research and Development,2016,53(5):968-987.
[2]杨林,于全.动态赋能网络空间防御[M].北京:人民邮电出版社,2016.YANG L,YU Q.Dynamically-enabled cyber defense[M].Beijing:Post&Telecom Press,2016.
[3]吴迪,连一峰,陈恺,等.一种基于攻击图的安全威胁识别和分析方法[J].计算机学报,2012,35(9):1938-1950.WU D,LIAN Y F,CHEN K,et al.A security threats identification and analysis method based on attack graph[J].Chinese Journal of Computers,2012,35(9):1938-1950.
[4]CARROLL T E,CROUSE M,FULP E W,et al.Analysis of network address shuffling as a moving target defense[C]//IEEE International Conference on Communications.2014:701-706.
[5]LUO Y B,WANG B S,CAI G L.Effectiveness of port hopping as a moving target defense[C]//International Conference on Security Technology.2014:7-10.
[6]HAMLET J R,LAMB C C.Dependency graph analysis and moving target defense selection[C]//ACM Workshop on Moving Target Defense.2016:105-116.
[7]雷程,马多贺,张红旗,等.基于变点检测的网络移动目标防御效能评估方法[J].通信学报,2017,38(1):126-140.LEI C,MA D H,ZHANG H Q,et,al.Performance assessment approach based on change-point detection for network moving target defense[J].Journal on Communications,2017,38(1):126-140.
[8]ZHUANG R,DELOACH S A,OU X.A model for analyzing the effect of moving target defenses on enterprise networks[C]//Cyber and Information Security Research Conference.2014:73-76.
[9]陈锋,张怡,苏金树,等.攻击图的两种形式化分析[J].软件学报,2010,21(4):838-848.CHEN F,ZHANG Y,SU J S,et al.Two formal analyses of attack graphs[J].Journal of Software,2010,21(4):838-848.
[10]YIH H,ANUP K G.Introducing diversity and uncertainty to create moving attack surfaces for Web services[M]//Moving Target Defense.Springer,2011:131-151.
[11]CHRISTODORESCU M,FREDRIKSON M,JHA S,et al.End-to-end software diversification of internet services[M]//Moving Target Defense.Springer,2011:117-130.
[12]崔臣浩,祝跃飞,李伟,等.基于移动目标防御的内网防渗透技术研究[J].计算机应用研究,2016,33(4):1141-1144.CUI C H,ZHU Y F,LI W,et al.Research on inner network permeating prevention based on moving target defense[J].Application Research of Computers,2016,33(4):1141-1144.