计算机科学 ›› 2014, Vol. 41 ›› Issue (7): 194-199.doi: 10.11896/j.issn.1002-137X.2014.07.041

• 信息安全 • 上一篇    下一篇

基于GTST-MLD的复杂网络风险评估方法

卢志刚,刘俊荣,刘宝旭   

  1. 中国科学院高能物理研究所计算中心 北京100049;中国科学院高能物理研究所计算中心 北京100049;中国科学院高能物理研究所计算中心 北京100049
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家科技支撑计划项目(2012BAH14B02),国家发改委信息安全专项项目(发改办高技[2012]1424号)资助

Risk Assessment Methods of Complex Network Based on GTST-MLD

LU Zhi-gang,LIU Jun-rong and LIU Bao-xu   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对复杂信息系统复杂程度高、互影响性与互依赖性强,现有风险评估方法难以适应大规模网络安全风险评估与应用实践的需要的问题,研究了基于GTST-MLD的适合复杂信息系统的风险要素分析方法和整体风险评估方法,包括研究事故互依赖关系模型,进行风险要素建模以及风险传导分析,以提高针对复杂信息系统的风险评估能力和分析水平。结果证明,模型对复杂信息系统安全特性的目标、功能、结构、行为等因素予以综合,实现在更高的系统功能层面上对系统安全性的分析研究,为复杂信息系统的量化风险评估提供了可靠的量化分析手段。

关键词: 复杂网络,信息安全,风险评估,依赖关系,风险传导 中图法分类号TP393文献标识码A

Abstract: Aiming at the broblems that complex information systems have the high complexity,mutual influence and interdependence,and the existing risk assessment methods are difficult to adapt to large-scale network security risk assessment and application needs of practice,we researched risk factor analysis method and the overall risk assessment methods of complex information system based on GTST-MLD,including the study of complex systems model of accidents interdependencies,risk factors model and risk conduction analysis,which improves risk assessment capabilities and level of analysis for complex information system.The results prove that the model consolidates the security features of complex information system,such as objectives,functions,structure,behavior and so on,achieves security analysis at a higher level system functions,and provides a reliable means of quantitative analysis for complex information system risk assessment.

Key words: Complex network,Information security,Risk assessment,Interdependencies,Risk conduction

[1] C&A Systems Security:The COBRA Risk Consultant MethodologyTM,July 1999
[2] NIST:Automated Security Self-Evaluation Tool(ASSET).http://csrc.nist.gov/asset
[3] Landherr A,Friedl B,Heidemann J.A critical review of centrality measures in social networks[J].Business&Information Systems Engineering,2010,2(6):371-385
[4] Kermarrec A,Merrer E L,Sericola B,et al.Second order centrality:Distributed assessment of nodes criticity in complex networks[J].Computer Communications,2011,4(5):619-628
[5] 谭跃进,吴俊,邓宏钟.复杂网络中节点重要度评估的节点收缩方法[J].系统工程理论与实践,2006,6(11):79-83
[6] 吴俊,谭跃进,邓宏钟,等.考虑级联失效的复杂网络节点重要度评估[J].小型微型计算机系统,2007,4(4):627-630
[7] 张琨,李配配,等.基于PageRank的有向加权复杂网络节点重要性评估方法[J].南京航空航天大学学报,2013,5(3):429-434
[8] Page L,Brin S,MotwaniR,et al.The PageRank citation ranking:bringing order to the Web[EB/OL].http://ilpubs.stanford.edu:8090/422/,2012-05-13
[9] Barrat A,Barthelemy M,Vespignani A.Modeling the evolution of weighted networks[J].Physical Review E,2004,0(6):1-12
[10] Chvátal V.Tough graphs and Hamiltonian circuits[J].Discrete Mathematics,1973,5(3):215-228
[11] Peng Y,Chen C,Koh K.On the edge-toughness of a graph(I)[J].Southeast AsianMath.Bull,1988,12:109-122
[12] Cunningham W H.Optimal attack and reinforcement of a network[J].Journal of the ACM(JACM),1985,32(3):549-561
[13] Zerkle D,Levitt K.Netkuang-a multi-host configuration vulnerabilitychecker[C]∥Proc.of the 6th USENIX Security Symposium.1996
[14] Albert R,Jeong H,Barabási A L.Error and attack tolerance of complexnetworks[J].Nature,2000,406(6794):378-382
[15] Cohen R,Erez K,Ben-Avraham D,et al.Resilience of the Internet torandom breakdowns[J].Physical Review Letters,2000,85(21):4626-4628
[16] Buldyrev S V,Parshani R,Gerald S,et al.Catastrophic cascadeof failures in interdependent networks[J].Nature,2010,464(7291):1025-1028
[17] Motter A E,Lai Y C.Cascade-based attacks on complex networks[J].Physical Review E,2002,66(6):65-102
[18] Wu J-J,Gao Z-Y,Sun H-J.Cascade and breakdown in scale-free networkswith community structure[J].Physical Review E,2006,74(6):66-111
[19] Wang J-W,Rong L-L.Cascade-based attack vulnerability on the US powergrid[J].Safety Science,2009,47(10):1332-1336
[20] Sun H,Zhao H,Wu J.A robust matching model of capacity to defensecascading failure on complex networks[J].Physica A:Statistical Mechanics and Its Applications,2008,387(25):6431-6435
[21] Lehmann J,Bernasconi J.Stochastic load-redistribution model for cascading failure propagation[J].Physical Review E,2010,81(3):31-129
[22] Zheng J F,Gao Z Y,Zhao X M.Clustering and congestioneffects oncascading failures of scale-free networks[J].EPL,2007,79:58002
[23] Holme P,Kim B J.Vertex overload breakdown in evolving networks[J].Physical Review E,2002,65(6):66-109
[24] 程耀东,刘宝旭,孙功星,等.高能物理与云计算[J].核电子学与探测技术,2011,31(11):1189-1194

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!