用户名: 密码: 验证码:
基于超网络的网络安全事件连锁演化模型
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Network Security Event Chain Evolution Model Based on Super Network
  • 作者:姬逸潇 ; 吴晨思 ; 杨粟 ; 郭敏 ; 张玉清
  • 英文作者:JI Yixiao;WU Chensi;YANG Su;GUO Min;ZHANG Yuqing;School of Network and Information Security, Xidian University;National Computer Network Intrusion Prevention, University of Chinese Academy of Science;Beijing computer technology and application institute;
  • 关键词:网络安全事件 ; 超网络 ; 连锁演化
  • 英文关键词:network security event;;super network;;chain evolution
  • 中文刊名:XAXB
  • 英文刊名:Journal of Cyber Security
  • 机构:西安电子科技大学网络与信息安全学院;中国科学院大学国家计算机网络入侵防范中心;北京计算机技术及应用研究所;
  • 出版日期:2019-01-15
  • 出版单位:信息安全学报
  • 年:2019
  • 期:v.4
  • 基金:国家重点研发计划项目(No.2016YFB0800700);; 国家自然科学基金项目(No.61572460,No.61272481);; 信息安全国家重点实验室的开放课题(No.2017-ZD-01);; 国家发改委信息安全专项项目[No.(2012)1424];; 国家111项目(No.B16037)的资助
  • 语种:中文;
  • 页:XAXB201901008
  • 页数:12
  • CN:01
  • ISSN:10-1380/TN
  • 分类号:93-104
摘要
由于网络的强大的互通性,安全事件的发生常常伴随着其他安全事件的触发,形成连锁反应,造成一定的危害和经济损失。本文从系统论的角度出发,研究网络安全事件之间的不同关联,分析安全事件演化的不同模式,以点、链、网的概念为基础,引入超网络进一步建立四层演化模式的概念,并针对安全事件的不同演化模式进行了详细分析;最后通过实际案例说明了安全事件演化模型的可行性。研究结论对于预防安全事件影响的扩大,以及危害的宏观预警具有一定的积极意义。
        Due to the strong interoperability of the network, the occurrence of security incidents is often triggered by other security incidents, forming a chain reaction, causing certain harm and economic losses. From the pers pective of system theory, this paper studies the different relationships between network security events, analyzes the different modes of security event evolution, and introduces the concept of point, chain and network to introduce the concept of four-layer evolution mode. The different evolution modes of security events are analyzed in detail. Finally, the feasibility of the security event evolution model is illustrated by actual cases. The conclusions of the study have certain positive significance for preventing the expansion of the impact of security incidents and the macro-warning of hazards.
引文
[1]Yang Yixian,Niu Xinzhen,and Li Mingxuan,“Network information security and confidentiality,”Beijing University of Posts and Telecommunications Press,2001.(杨义先,钮心忻,李名选,“网络信息安全与保密”,北京邮电大学出版社,2001.)
    [2]Which IT security tasks are you facing the most pressure to address?,https://www.statista.com/statistics/709789/most-pressingglobal-cyber-security-issues/,Jan.2018.
    [3]The first anniversary of the outbreak of WannaCry,5 million computers were attacked by ransomware,http://www.freebuf.com/articles/network/171608.html,May.2018.(在WannaCry爆发一周年之际,500万台计算机遭到勒索软件攻击,http://www.freebuf.com/articles/network/171608.html,May.2018.)
    [4]Eugene Schultz E.“Network Security Incident Response,”Information Network Security,no.3,pp.35-35,2003.(EugeneSchultz E,“《网络安全事件响应》”,信息网络安全,2003(3):35-35.)
    [5]Gong Yu,Pei Xiaodong,Su Qi,and et al,“Survey of Network Security Situation Awareness,”Journal of Software,vol.28,no.4,pp.1010-1026,2017.(龚俭,臧小东,苏琪等,“网络安全态势感知综述”,软件学报,2017,28(4):1010-1026.)
    [6]GB/Z 20986-2007“Information Security Event Classification and Grading Guide”.(GB/Z 20986-2007《信息安全事件分类分级指南》).
    [7]System Theory,https://baike.baidu.com/item/%E7%B3%BB%E7%BB%9F%E8%AE%BA/1133820?fr=aladdin,Jun.2018.(系统论,https://baike.baidu.com/item/%E7%B3%BB%E7%BB%9F%E8%AE%BA/1133820?fr=aladdin,Jun.2018.)
    [8]Salah S,Maciá-Fernández G,and DíAz-Verdejo J S E.“A model-based survey of alert correlation techniques,”Computer Networks,vol.57,no.5,pp.1289-1317,2013.
    [9]Li Minggui,Xiao Yi,Chen Jianfeng,and et al,“Big Data-based Framework for Security Event Mining,”Communications Technology,vol.48,no.3,pp.346-350,Mar.2015.(李明桂,肖毅,陈剑锋等,“基于大数据的安全事件挖掘框架”,通信技术,2015,48(3):346-350.)
    [10]Zhong C,Yen J,Liu P,and et al,“Learning From Experts'Experience:Toward Automated Cyber Security Data Triage,”IEEE Systems Journal,2018.
    [11]Cai Xiaozhi,Zhang Hexun,Xu Yang,and et al,“Management and technical points of life cycle management and control of security events,”Network Security Technology and Application,pp.16-16,2018.(蔡晓志,张贺勋,徐扬等,“安全事件生命周期管控管理及技术要点”,网络安全技术与应用,2018(3):16-16.)
    [12]Feng Tao,Zhang Yuqing,and Gao Youxing,“Network Security Incident Response Linkage System Model,”Computer Engineering,vol.30,no.13,pp.101-103,Jul.2004.(冯涛,张玉清,高有行,“网络安全事件应急响应联动系统模型”,计算机工程,2004,30(13):101-103.)
    [13]Wang Ruigang,“Research on Structure and Linkage of Nisier System,”Computer Applications and Software,vol.28,no.10,pp.117-119,Oct.2018.(王瑞刚,“网络与信息安全事件应急响应体系层次结构与联动研究”,计算机应用与软件,2011,28(10):117-119.)
    [14]Zhao Xu,Wen and Jiaxin Z,“Research on provincial network security emergency management platform based on secure access design,”Research&Exploration in Laboratory,vol.37,no.6,pp.293-296,Jun.2018.(赵旭,文佳欣,Z,“基于安全访问设计的省级网络安全应急管理平台研究”,Research&Exploration in Laboratory,2018,37(6).)
    [15]Wang Yingying,Luo Yi,Tu Guangyu,and et al.“Search Method for Power System Cascading Failures Using Graph Theory,”High Voltage Engineering,vol.36,no.2,pp.401-405,Feb.2010.(王英英,罗毅,涂光瑜等,“采用图论的电网连锁故障模式搜索方法”,高电压技术,2010,36(2):401-405.)
    [16]Zhai Plastic,Liu Youbo,Liu Junyong,and et al,“Cascading Failure Feature Analysis Based on Time-series Operation Evolution Model,”Proceedings of the CSEE,vol.35,pp.82-92,Sep.2015.(刁塑,刘友波,刘俊勇等,“电力系统连锁故障的多层时序运行演化模型与应用”,中国电机工程学报,2015(S1):82-92.)
    [17]Rong Lili,and Tan Hua,“Modelling Chain-reactions to Emergency Based on Disaster-pregnant Enviroment,”Systems Engineering,vol.30,no.7,pp.40-47,Jul.2012.(荣莉莉,谭华,“基于孕灾环境的突发事件连锁反应模型”,系统工程,2012(7):40-47.)
    [18]WANG Ning,LU Guo-Chen,and CHEN Ke,“Reasoning Method of Emergency Chain Reaction Path Based on Knowledge Element,”Systems Engineering,vol.34,no.5,pp.121-128,May.2010.(王宁,路国粹,钞柯,“基于知识元的突发事件连锁反应路径推理方法”,系统工程,2016(5):121-128.)
    [19]Zhu Zhengwei,Zhao Xinxin,and Cai Li.“Simulation Study of Public Safety Emergencies Based on The Complex Dynamics Model of Emergency Proliferation,”China Administration,pp.125-128,2012.(朱正威,赵欣欣,蔡李,“突发公共安全事件扩散动力学模型仿真研究”,中国行政管理,2012(9):125-128.)
    [20]Rong Lili,and Zhang Rong,“An emergency event chain reaction path deduction model based on discrete Hopfield neural network,”Journal of Dalian University of Technology,vol.53,no.4,pp.607-614,Jul.2013.(荣莉莉,张荣,“基于离散Hopfield神经网络的突发事件连锁反应路径推演模型”,大连理工大学学报,2013,53(4):607-614.)
    [21]Katz G,Elovici Y,Shapira and B.CoBAn,“A context based model for data leakage prevention,”Information Sciences,vol.262,no.3,pp.137-158,2014.
    [22]Dong J,“Impact of Bombardier Central ATS System Paralysis on Traffic Organization,”Urban Mass Transit,2014.
    [23]Moreno R,and Strbac G,“Integrating high impact low probability events in smart distribution network security standards through CVAR optimization,”Iet International Conference on Resilience of Transmission and Distribution Networks.IET,pp.1-6,2016.
    [24]Spanos G,and Angelis L,“The impact of information security events to the stock market,”Elsevier Advanced Technology Publications,2016.
    [25]Raven M C,Guzman D,Chen A H,and et al.“Out‐of‐Network Emergency Department Use among Managed Medicaid Beneficiaries,”Health services research,vol.52,no.6,pp.2156-2174,2017.
    [26]Naheed M,Mahmood H,and Murtza I,“Secure multipath routing using link compromise metric in mobile ad hoc networks,”Electrical Engineering(RAEE),2015 Symposium on Recent Advances in.IEEE,pp.1-5,2015.
    [27]Rong Lili,and Zhang Jiyong.“Research on different evolution models of emergency,”Journal of Natural Disasters vol.21,no.3,Jun.2012.(荣莉莉,,张继永,“突发事件的不同演化模式研究”,自然灾害学报,2012(3):03-06.)
    [28]National cybersecurity incident emergency plan,http://www.cac.gov.cn/2017-06/27/c_1121220113.htm,Sept.2018.(国家网络安全事件应急预案,http://www.cac.gov.cn/2017-06/27/c_1121220113.htm,Sept.2018.)
    [29]Su Jianfei,and Wang Jingwei,“Discussion on Network Security and Attack Techniques,”Communications Technology,vol.43,no.01,pp.91-93,2010.(苏剑飞,王景伟,“网络攻击技术与网络安全探析”,通信技术,2010(1):91-93.)
    [30]Ying Xiangrong.“The Importance of Active Defense System under the New Trend of Network Attack,”Computer Security,pp.53-55,2003.(应向荣,“网络攻击新趋势下主动防御系统的重要性”,计算机安全,2003(29):53-55.)
    [31]Lin J,and Kang B,“Research on occurrence mechanism of public security emergency from the perspective of the structure box,”DEStech Transactions on Social Science,Education and Human Science,2016.
    [32]Qiu Jiangnan,Wang Yanzhang,and Zhang Rong,“A Model for Predicting Emergency Event Based on Bayesian Networks,”Journal of Systems&M anagement,vol.20,no.1,pp.98-108,Feb.2011.(裘江南,王延章,董磊磊等,“基于贝叶斯网络的突发事件预测模型”,系统管理学报,2011,20(1):98-103.)
    [33]Perrig A,and Stankovic J,“Wagner D.Security in wireless sensor networks,”Communications of the ACM,vol.47,no.6,pp.53-57,2004.
    [34]Gan G,Lu Z,and Jiang J,“Internet of things security analysis,”Internet Technology and Applications(iTAP),2011 International Conference on.IEEE,pp.1-4,2011.
    [35]Ma Tao,and Guo Jinli,“Forming mechanism of matrix system enterprise project team hypernetwork based on hypergraph,”Application Research of Computers,vol.35,no.1,Jan.2018.(马涛,郭进利,“基于超图的矩阵制企业项目小组超网络形成机制研究”,计算机应用研究,2018,1:015.)
    [36]Q Zhu,and AT Azar,“Complex system modelling and control through intelligent soft computations,”Germany:Springer,2015.
    [37]Li Y X,and Xie Y J,“Analysis and enlightenment on the cybersecurity strategy of various countries in the world,”Chinese Journal of Network and Information Security,vol.2,no.1,pp.1-5,2016.
    [38]Wang Zhongtuo,and Wang Zhiping,“Elementary Study of Supernetworks,”Chinese Journal of Management,vol.5,no.1,Jan.2008.(王众托,,王志平,“超网络初探”,管理学报,2008,5(1):1.)
    [39]Daskin M S,“Urban transportation networks:Equilibrium analysis with mathematical programming methods,”1985.
    [40]Nagurney A,Dong J,“Supernetworks:decision-making for the information age,”Elgar,Edward Publishing,Incorporated,2002.
    [41]Fu-li S,Yong-lin L,and Yi-fan Z,“A military communication supernetwork structure model for netcentric environment,”Computational and Information Sciences(ICCIS),2010 International Conference on.IEEE,pp.33-36,2010.
    [42]Super network,https://baike.baidu.com/item/%E8%B6%85%E7%BD%91%E7%BB%9C/6663430?fr=aladdin,Nov.2014.(超网络,https://baike.baidu.com/item/%E8%B6%85%E7%BD%91%E7%BB%9C/6663430?fr=aladdin,Nov.2014.)
    [43]Elementary event,https://baike.baidu.com/item/%E5%9F%BA%E6%9C%AC%E4%BA%8B%E4%BB%B6/552306?fr=aladdin,June.2018.(基本事件,https://baike.baidu.com/item/%E5%9F%BA%E6%9C%AC%E4%BA%8B%E4%BB%B6/552306?fr=aladdin,June.2018.)
    [44]Zhou Q,Chen J,Liu H,et al,“Simulation Software for Evolution of BA Scale-free Networks Based on LabVIEW,”Electronic Science&Technology,2016.
    [45]Hu Feng,Zhao Haixing,and Ma Xiujuan,“An evolving hypernetwork model and its propertiesl,”Science in China:Physics Mechanics Astronomy,vol.43,no.1,pp.16-22,Jan.2013.(胡枫,赵海兴,马秀娟,“一种超网络演化模型构建及特性分析”,中国科学:物理学力学天文学,2013(1):16-22.)
    [46]Tengxu computer housekeeper.WannaCry worm first anniversary,blackmail virus,http://www.freebuf.com/articles/system/171448.html,May.2018.(WannaCry蠕虫一周年,勒索病毒狼烟四起,http://www.freebuf.com/articles/system/171448.html,May.2018.)
    [47]Kirin.WannaCry ransomware,this is the case,https://www.guokr.com/article/442167/,May.2017.(麒麟.WannaCry勒索病毒,是这么一回事,https://www.guokr.com/article/442167/,May.2017.)
    [48]Scenes infected by WannaCry virus attack,http://www.freebuf.com/news/135095.html,May.2017.(那些被WannaCry病毒攻击感染的场景,http://www.freebuf.com/news/135095.html,May.2017.)
    [49]Pascariu C,BARBU I D,Bacivarov I C.Investigative Analysis and Technical Overview of Ransomware Based Attacks.Case Study:WannaCry.Int'l J.Info.Sec.&Cybercrime,2017,6:57.
    [50]Deep technical analysis of ransomware WannaCry-detailing the details of transmission,infection and hazards,https://www.secpulse.com/archives/58077.html,May.2017.(勒索病毒WannaCry深度技术分析--详解传播、感染和危害细节,https://www.secpulse.com/archives/58077.html,May.2017.)

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700