基于弱点相关性的网络安全性分析方法  被引量:5

A Network Security Analysis Method Based on Vulnerability Correlation

在线阅读下载全文

作  者:谢朝海[1,2] 陶然[1] 蔡学军[2] 毕马宁[3] 

机构地区:[1]北京理工大学信息科学技术学院,北京100081 [2]深圳职业技术学院,广东深圳518055 [3]公安部信息安全等级保护评估中心,北京100037

出  处:《兵工学报》2009年第4期486-490,共5页Acta Armamentarii

基  金:国防基础科研项目(C1120060497-06)

摘  要:当前网络安全性分析不但要考虑单个弱点的利用攻击,而且还需要考虑多个弱点的组合利用攻击。其常用分析方法是攻击图方法,但是攻击图方法通常存在指数级状态爆炸问题。为此,引入了弱点相关矩阵和弱点相关图的概念,给出了弱点相关图生成算法并举例说明其在网络系统安全性分析中的应用。结果表明,弱点相关图具有网络系统弱点数的多项式状态,可以用于分析复杂网络系统,便于系统管理员使用,有助于改善网络系统的安全。Recently in-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to compute attack graphs using a variety of graph-based algorithms. However, such methods generally suffer from the exponential state space problem. Therefore, two conceptions of vulnerability correlation matrix and vulnerability correlation graph (VCG) were introduced into network security analysis. An algorithm based on vulnerability correlation matrix was proposed to generate VCGs. An example was given to illustrate the application and effect of the algorithm in network security analysis. Deep analysis shows that VCGs have polynomial complexity of the number of network vulnerabilities, scale well for large networks, are convenient for network managemer and helpful to improving network security.

关 键 词:计算机科学技术基础学科 网络安全 弱点相关性 攻击图 弱点相关图 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象