检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:方明[1] 徐开勇[1] 杨天池[1] 孟繁蔚[1] 禹聪[1]
出 处:《计算机科学》2013年第2期139-144,共6页Computer Science
摘 要:对信息系统进行有效的风险评估,选择有效的防范措施,主动防御信息威胁,是解决信息系统安全问题的关键所在。将攻击图模型应用于信息安全的风险评估。首先针对信息安全风险评估的不确定性和复杂性,将脆弱点关联技术用于风险评估。其次,针对攻击图所描述的攻击路径对于定量指标的分析缺乏相应的处理能力,而风险因素的指标值具有很大的不确定性等问题,采用攻击路径形成概率对信息安全的风险因素的指标进行量化,对原子攻击成功概率进行预处理,提出了基于攻击图模型的分布式风险评估方法。该方法充分利用网络系统中各个主机的计算能力,极大地缩短了攻击图生成时间。Evaluating risk effectively, selecting effective defence measures and defending information threats actively are the key points of resolving security problems of information system. Based on the actual requirements and status of risk assessment of information security, we integrated attack graph to apply it in studying risk assessment of information se- curity. Firstly,focused on the uncertainty and complexity of risk assessment of information security, we integrated the technology of vulnerabilities associated with to apply it in studying risk assessment. On the other hand, since the attack path described by attack graph model is suited for the quantity data processing, and poor to the qualitative analysis,and risk is uncertain, we quantized the risk factors by the probability of attack path forming proposed in this dissertation, pre-treated the probability of atom attack, and proposed a risk assessment method based on attack graph model. The method takes full advantage of computing power of each host in the network, greatly shortens the attack graph genera- tion time.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.31