检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]长庆钻井公司,陕西西安710018 [2]西北工业大学,陕西西安710072 [3]空军工程大学,陕西西安710068
出 处:《现代电子技术》2013年第9期84-87,共4页Modern Electronics Technique
基 金:国家科技支撑计划项目(2012BAB15B01)
摘 要:随着网络的发展,网络安全评估成为网络维护中不可或缺的组成部分,尽管攻击图、攻击树和其他技术已被广泛地用于预测所有漏洞,但仍然缺少一个有效的手段来量化地分析网络安全。介绍一个新方法构建一个带标记的攻击图,图中的每个节点都被标注了一个概率值用来说明该漏洞被成功利用的可能性,每条边都代表了漏洞间的关联。采用通用漏洞评分系统(CVSS)作为基础计算每个漏洞被利用的概率,采用贝叶斯网络计算累积的概率,并用一些典型场景评估了该方法的有效性和准确性。With the development of network, Network security assessment becomes a vital process that needs to be executed to maintain network. Although attack graph, attack tree and other technologies have been proposed to predict all vulnerabilities, there is still lack an efficient way to quantitatively analyze the network security. In this paper, a new method is proposed to construct a marked attack graph, in which each node in the attack graph is marked with a probability value to explain the likelihood of a successful exploit, and each edge represents the relationship between vulnerabilities. The common vulnerability scoring system (CVSS) was adopted as a foundation to compute the probability of each vulnerability. Bayesian Network was employed to compute the accumulated probability. The efficiency and accuracy of this method are assessed with some typical cases.
分 类 号:TN915.08[电子电信—通信与信息系统] TP393[电子电信—信息与通信工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.112