用户名: 密码: 验证码:
网络动态防御体系下主机安全威胁分析方法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Host security threat analysis approach for network dynamic defense
  • 作者:李立勋 ; 张斌 ; 董书琴
  • 英文作者:LI Lixun;ZHANG Bin;DONG Shuqin;Information Engineering University;Henan Province Information Security Key Laboratory;
  • 关键词:网络安全 ; 网络动态防御 ; 主机安全威胁分析 ; 入侵成功概率 ; 入侵者权限转移图
  • 英文关键词:cyber security;;network dynamic defense;;host security threat analysis;;attack success probability;;attacker privilege transfer graph
  • 中文刊名:WXAQ
  • 英文刊名:Chinese Journal of Network and Information Security
  • 机构:信息工程大学;河南省信息安全重点实验室;
  • 出版日期:2018-04-15
  • 出版单位:网络与信息安全学报
  • 年:2018
  • 期:v.4;No.29
  • 基金:河南省基础与前沿技术研究计划基金资助项目(No.2014302903);; 信息保障技术重点实验室开放基金资助项目(No.KJ-15-109);; 信息工程大学新兴科研方向培育基金资助项目(No.2016604703)~~
  • 语种:中文;
  • 页:WXAQ201804006
  • 页数:8
  • CN:04
  • ISSN:10-1366/TP
  • 分类号:52-59
摘要
分析网络动态防御体系下的主机安全威胁必须考虑动态变换给主机脆弱性造成的不确定性。为此,首先,利用随机抽样模型对网络动态防御变换周期和变换空间给主机脆弱性造成的不确定性进行量化,并结合通用漏洞评分系统CVSS(common vulnerability scoring system)计算入侵者针对单个脆弱性的入侵成功概率;其次,为避免多脆弱性情况下的入侵路径搜索过程出现自环,引入节点访问队列并提出改进的递归深度优先入侵路径搜索算法;然后基于求得的脆弱性入侵成功概率计算多脆弱性多入侵路径情况下的主机安全威胁度;最后,在典型网络动态防御环境中进行实验,验证了方法的可用性和有效性。
        Calculating the host security threat in network dynamic defense(NDD) situation has to consider the vulnerabilities' uncertainty because of dynamic mutation. Firstly, the vulnerabilities' uncertainty caused by the mutation space and the mutation period was calculated by random sampling model, and combined with the CVSS, the attack success probability formula of single vulnerability was derived. Secondly, to avoid self-loop during the path searching process in multiple vulnerabilities situation, an improved recursive depth first algorithm which combined with node visited queue was proposed. Then, the host security threat was calculated based on attack success probability in the situation of multiple vulnerabilities and paths. Finally, approach's availability and effectiveness were verified by an experiment conducted in a typical NDD situation.
引文
[1]蔡桂林,王宝生,王天佐,等.移动目标防御技术研究进展[J].计算机研究与发展,2016,53(5):968-987.CAI G L,WANG B S,WANG T Z,et al.Research and development of moving target defense technology[J].Journal of Computer Research and Development,2016,53(5):968-987.
    [2]杨林,于全.动态赋能网络空间防御[M].北京:人民邮电出版社,2016.YANG L,YU Q.Dynamically-enabled cyber defense[M].Beijing:Post&Telecom Press,2016.
    [3]吴迪,连一峰,陈恺,等.一种基于攻击图的安全威胁识别和分析方法[J].计算机学报,2012,35(9):1938-1950.WU D,LIAN Y F,CHEN K,et al.A security threats identification and analysis method based on attack graph[J].Chinese Journal of Computers,2012,35(9):1938-1950.
    [4]CARROLL T E,CROUSE M,FULP E W,et al.Analysis of network address shuffling as a moving target defense[C]//IEEE International Conference on Communications.2014:701-706.
    [5]LUO Y B,WANG B S,CAI G L.Effectiveness of port hopping as a moving target defense[C]//International Conference on Security Technology.2014:7-10.
    [6]HAMLET J R,LAMB C C.Dependency graph analysis and moving target defense selection[C]//ACM Workshop on Moving Target Defense.2016:105-116.
    [7]雷程,马多贺,张红旗,等.基于变点检测的网络移动目标防御效能评估方法[J].通信学报,2017,38(1):126-140.LEI C,MA D H,ZHANG H Q,et,al.Performance assessment approach based on change-point detection for network moving target defense[J].Journal on Communications,2017,38(1):126-140.
    [8]ZHUANG R,DELOACH S A,OU X.A model for analyzing the effect of moving target defenses on enterprise networks[C]//Cyber and Information Security Research Conference.2014:73-76.
    [9]陈锋,张怡,苏金树,等.攻击图的两种形式化分析[J].软件学报,2010,21(4):838-848.CHEN F,ZHANG Y,SU J S,et al.Two formal analyses of attack graphs[J].Journal of Software,2010,21(4):838-848.
    [10]YIH H,ANUP K G.Introducing diversity and uncertainty to create moving attack surfaces for Web services[M]//Moving Target Defense.Springer,2011:131-151.
    [11]CHRISTODORESCU M,FREDRIKSON M,JHA S,et al.End-to-end software diversification of internet services[M]//Moving Target Defense.Springer,2011:117-130.
    [12]崔臣浩,祝跃飞,李伟,等.基于移动目标防御的内网防渗透技术研究[J].计算机应用研究,2016,33(4):1141-1144.CUI C H,ZHU Y F,LI W,et al.Research on inner network permeating prevention based on moving target defense[J].Application Research of Computers,2016,33(4):1141-1144.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700