浏览全部资源
扫码关注微信
1. 信息工程大学 郑州 450001
2. 数学工程与先进计算国家重点实验室 郑州 450001
[ "刘文芬,女,博士,信息工程大学教授、博士生导师,主要研究方向为概率统计在通信和密码学中的应用。" ]
[ "张树伟,男,信息工程大学硕士生,主要研究方向为网络风险安全度量。" ]
[ "龚心,男,信息工程大学硕士生,主要研究方向为密码学中的逻辑函数。" ]
网络出版日期:2014-07,
纸质出版日期:2014-07-20
移动端阅览
刘文芬, 张树伟, 龚心. 一种优化的基于Markov博弈理论的网络风险评估方法[J]. 电信科学, 2014,30(7):13-18.
Wenfen Liu, Shuwei Zhang, Xin Gong. An Improved Network Risk Evaluation Metbod Based on Markov Game[J]. Telecommunications science, 2014, 30(7): 13-18.
刘文芬, 张树伟, 龚心. 一种优化的基于Markov博弈理论的网络风险评估方法[J]. 电信科学, 2014,30(7):13-18. DOI: 10.3969/j.issn.1000-0801.2014.07.003.
Wenfen Liu, Shuwei Zhang, Xin Gong. An Improved Network Risk Evaluation Metbod Based on Markov Game[J]. Telecommunications science, 2014, 30(7): 13-18. DOI: 10.3969/j.issn.1000-0801.2014.07.003.
对网络系统进行安全风险评估,是一种获取并掌握网络信息系统目前及未来安全状态的重要方法,对保障网络安全运行具有重要意义。提出了一种优化的基于Markov博弈理论的网络风险评估方法,不同于已有方法单纯地将网络资产的风险状态分为固定类别的方式,该方法依据攻击威胁与修复漏洞的博弈关系得到资产的具体风险情况,刻画更加细致,贴近网络实际;并且将攻击威胁以及漏洞信息进行了归类处理,减小了状态空间,使得模型输入规模大大降低,提高了对大规模网络进行评估的效率。此外,通过引入节点相关性,考虑节点之间风险状况的相互影响,解决了网络安全风险量化过程中普遍存在的忽视网络节点相关性的问题,提高了风险评估的准确性。仿真实验验证了该方法的可行性及有效性。
Network security risk assessment is an important means of acquiring and mastering the current and future state of network
which is of great significance to maintain the safe operation of the network. An improved risk assessment method based on Markov game that has simply changed the past was presented
in which the risk status of the network assets were classified into fixed categories. Depending on the game relationship between vulnerabilities fixing and threat attacking
this method has more detailed characterization of the network risk. Network attacks and vulnerabilities were sorted
which reduced the state space
making the scale of model input greatly reduced
improving the assessment of large-scale network efficiency. In addition
the relative importance of the hosts was taken into account to distinguish the contribution of different hosts on the network risk. Simulation results demonstrate the feasibility and effectiveness of this method.
Grobauer B , Walloschek T , Stocker E . Understanding cloud computing vulnerabilities . IEEE Security&;Privacy , 2011 , 9 ( 2 ): 50 ~ 57
刘刚 , 李千目 , 张宏 . 信度向量正交投影分解的网络安全风险评估方法 . 电子与信息学报 , 2012 , 34 ( 8 ): 1934 - 1938
Gehani A , Kedem G . Rheostat: real time risk management . Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection, French Riviera , France 2004 : 296 - 314
Arnes A , Valeur F , Vigna G , et al . Using hidden markov models to evaluate the risks of intrusions . Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection , Hamburg, Germany , 2006 : 145 ~ 164
陈秀真 , 郑庆华 , 管晓宏 等 . 层次化网络安全威胁态势量化评估方法 . 软件学报 , 2006 , 17 ( 4 ): 885 ~ 897
Chen L , Leneutre J . A game theoretical framework on intrusion detection in heterogeneous networks . IEEE Transactions on Information Forensics and Security , 2009 , 4 ( 2 ): 165 ~ 178
王元卓 , 林闯 , 程学旗 等 . 基于随机博弈模型的网络攻防量化分析方法 . 计算机学报 , 2010 , 33 ( 9 )
姜伟 , 方滨兴 , 田志宏 等 . 基于攻防博弈模型的网络安全测评和最优主动防御 . 计算机学报 , 2009 , 33 ( 14 ): 817 ~ 827
张永铮 , 方滨兴 , 迟悦 等 . 网络风险评估中网络节点关联性的研究 . 计算机学报 , 2007 , 30 ( 2 ): 234 ~ 240
Cui X L , Tan X B , Zhang Y , et al . A markov game theory-based risk assessment model for network information system . Proceedings of the 2008 International Conference on Computer Science and Software Engineering , Wuhan, China , 2008 : 1057 ~ 1061
0
浏览量
999
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构