计算机科学 ›› 2022, Vol. 49 ›› Issue (6A): 480-484.doi: 10.11896/jsjkx.210800048

• 信息安全 • 上一篇    下一篇

面向网络安全训练评估的受训者行为描述模型

陶礼靖, 邱菡, 朱俊虎, 李航天   

  1. 战略支援部队信息工程大学 郑州 450001
  • 出版日期:2022-06-10 发布日期:2022-06-08
  • 通讯作者: 邱菡(qiuhan410@aliyun.com)
  • 作者简介:(308633327@qq.com)

Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment

TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian   

  1. Information Engineering University,Zhengzhou 450001,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:TAO Li-jing,born in 1992,postgra-duate.His main research interests include network security simulation and evalua-tion.
    QIU Han,born in 1981,associate professor.Her main research interests include inter-domain routing system security and network security simulation and evaluation.

摘要: 对受训者训练表现的评估是提升网络安全训练成效的关键环节之一,对评估方法的研究包含了基于训练结果和基于训练行为建模的评估两个阶段,前者存在无法评价训练细节的问题,后者存在仅能对部分训练路径预建模,无法判定非预设训练路径下训练行为正确性的问题。为解决上述问题,提出了一种基于有向图和有限状态自动机的双层网络安全训练评估受训者行为描述模型,结合训练行为和训练结果各自的特点,实现对非预设训练行为的正确性判定和细节评价。针对典型网络安全训练场景的实验结果表明,相比仅关注训练行为的描述模型,该模型在提高训练行为判定准确性的同时,实现了对非预设路径训练行为正确性的判定和训练细节的刻画。

关键词: 网络安全训练, 训练行为建模, 有限状态自动机, 有向图

Abstract: The evaluation of trainee performance is one of the key points to improve the effectiveness of cyber security exercises,and the study of evaluation method includes two stages:evaluation based on training results and evaluation based on training behavior modeling.The first one cannot figure out the training details,the other can only pre-model some training paths so that it can't determine the correctness of non-preset training path training behavior.In order to solve the problems,a two-layer cyber security exercises trainee behavior description model based on the orientation graph and finite state automatic machine is proposed,and the correctness determination and detail evaluation of non-preset training behavior are realized by combining the characteri-stics of training behavior and training results.An experiment on typical computer network security training scenario shows that,compared with the description model that focuses only on training behavior,the model improves the accuracy of training behavior determination,and realizes the determination of non-preset path training behavior correctness and training details.

Key words: Cyber security exercises, Finite state automatic machine, Oriented graph, Training behavior modeling

中图分类号: 

  • TP393
[1] PATRICIU V V,FURTUNA A C.Guide for designing cyber security exercises[C]//World Scientific and Engineering Academy and Society(WSEAS).2009:172-177.
[2] HENSHEL D S,DECKARD G M,LUFKIN B,et al.Predictingproficiency in cyber defense team exercises[C]//IEEE.IEEE,2016:776-781.
[3] ČELEDA P,ČEGAN J,VYKOPAL J,et al.KYPO-A Platform for Cyber Defence Exercises[J/OL].https://is.muni.cz/repo/1319597/2015-NATO-MSG-133-kypo-platform-cyber-defence-exercises-paper.pdf.
[4] CARLISLE M,CHIARAMONTE M,CASWELL D.UsingCTFs for an Undergraduate Cyber Education[C]//2015 USENIX Summit on Gaming,Games,and Gamification in Security Education (3GSE 15).2015.
[5] VYKOPAL J,VIZVARY M,OSLEJSEK R,et al.Lessonslearned from complex hands-on defence exercises in a cyber range[C]//Proceedings of the 47th ACM Technical Symposium on Computing Science Education.2016:597-602.
[6] WEISS R S,LOCASTO M E,MACHE J.A Reflective Ap-proach to Assessing Student Performance in Cybersecurity Exercises[C]//Proceedings of the 47th ACM Technical Symposium on Computing Science Education.2016:597-602.
[7] ANDREOLINI M,COLACINO V G,COLAJANNI M,et al.A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises[J].Mobile Networks & Applications,2020,25(1):236-247.
[8] BRAGHIN C,CIMATO S,DAMIANI E,et al.Towards theMonitoring and Evaluation of Trainees' Activities in Cyber Ranges[C]//Hatzivasilis G.,Ioannidis S.(eds) Model-driven Simulation and Training Environments for Cybersecurity.MSTEC 2020.Lecture Notes in Computer Science,Cham:Springer,2020:79-91.
[9] FANG B X,JIA Y,LI A P,et al.Cyber Ranges:state-of-the-art and research challenges[J].Journal of Cyber Security,2016,1(3):1-9.
[10] WANG Q X,ZHU J H,QIU H.Cybersecurity Lab Tutorial[M].Zhengzhou:Electronic Industry Press,2016.
[1] 黄鑫权, 刘爱军, 梁小虎, 王桁.
基于矩阵论的一致性控制算法收敛速度分析
Matrix Theory Aided Convergence Analysis of Consensus Behavior in FANET with Beacon Loss
计算机科学, 2021, 48(6): 288-295. https://doi.org/10.11896/jsjkx.201000137
[2] 朱维军, 张春艳, 周清雷, 陈永华.
有向图k顶点导出子图的DNA粘贴算法
DNA Sticker Algorithm for k-vertex Induced Sub-graphs of Directed Graphs
计算机科学, 2019, 46(1): 309-313. https://doi.org/10.11896/j.issn.1002-137X.2019.01.048
[3] 陈冰川,陈蔼祥,吴向军,李磊.
基于数据源向图的数据库设计中数据关系的表示工具
Representation Tool of Data Relations in Database Design Based on Data Source-target Digraph
计算机科学, 2017, 44(Z6): 470-474. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.105
[4] 徐喜荣,黄亚真,张思佳,董学智.
广义Kautz有向图GK(3,n)的反馈数的界
Feedback Numbers of Generalized Kautz Digraphs GK(3,n)
计算机科学, 2016, 43(5): 13-21. https://doi.org/10.11896/j.issn.1002-137X.2016.05.003
[5] 陈秋茹,文中华,袁润,戴良伟.
利用有向环的性质求解可达关系
Solving Reachability Relationship by Property of Directed Cycle
计算机科学, 2016, 43(4): 202-205. https://doi.org/10.11896/j.issn.1002-137X.2016.04.041
[6] 李健利,王艺谋,谢悦,丁洪骞.
一种基于多样化历史信息的自动信任协商策略
Automated Trust Negotiation Based on Diverse History Information
计算机科学, 2016, 43(3): 122-126. https://doi.org/10.11896/j.issn.1002-137X.2016.03.025
[7] 栗青生,张 莉,刘 泉,熊 晶,杨新新.
一种基于云端信息保护的汉字计算模型
Chinese Character Computing Model Based on Cloud Information Protection
计算机科学, 2015, 42(11): 73-79. https://doi.org/10.11896/j.issn.1002-137X.2015.11.015
[8] 师海忠,师越.
(V,R)-语言
(V,R)-Languages
计算机科学, 2014, 41(Z6): 33-36.
[9] 师越,师海忠.
自然语言是正则语言
Natural Languages Are Regular Languages
计算机科学, 2014, 41(Z11): 51-54.
[10] 侯整风,杨波,朱晓玲.
一种适合中文的多模式匹配算法
Multiple Pattern Algorithm for Chinese
计算机科学, 2013, 40(11): 117-121.
[11] 崔宾阁,孟翱翔.
基于最近邻有向图的遥感图像快速分割算法
Fast Remote Sensing Image Segmentation Algorithm Based on Nearest Neighbor Direct Graph
计算机科学, 2013, 40(10): 274-278.
[12] 陈科,谢明霞,成毅.
空间信息服务链模型的有向图表示及其验证
Geo-serviceChain Model Expression by Directed Graph and Verification
计算机科学, 2012, 39(10): 240-244.
[13] 郭华,李舟军,庄雷,计宏霖.
一种新的电子商务协议分析方法
New Approach for Analyzing of E-commerce Protocol
计算机科学, 2010, 37(8): 56-60.
[14] 陈文宇,王晓斌,程小鸥,孙世新.
形式语言与自动机中关于ε的一些问题
Issues Regarding ε in Formal Language and Automata Theory
计算机科学, 2010, 37(1): 243-244.
[15] 廖巍,吴晓平,严承华,钟志农.
一种新的道路网络连续查询处理方法
Novel Method for Continuous Queries Processing in Road Networks
计算机科学, 2009, 36(9): 151-153.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!