Computer Science ›› 2013, Vol. 40 ›› Issue (Z11): 214-218.

Previous Articles     Next Articles

Method of Network Security Dynamic Assessment Based on Attack-defense Confrontation

LIAN Li-quan,PENG Wu and WANG Dong-hai   

  • Online:2018-11-16 Published:2018-11-16

Abstract: According to the characteristic of the network attack-defense real-time variation,a dynamic assessment method of network security state was presented.Firstly,a network security model based on vulnerability state transition was built,according to the characteristics of attack and defense both sides.Then the success probability and the consequences of attack success were quantitated,and the effects of attack-defense confrontation behaviors on the key asset security attributes such as confidentiality,integrity and availability were analyzed.Finally,the feasibility and validity of this method were proved through an experiment.

Key words: Attack graph,Security assessment,Visualization,Attack-defense confrontation

[1] 韦勇,连一峰.基于日志审计与性能修正算法的网络安全态势评估模型[J].计算机学报,2009,32(4):763-772
[2] Lau S.The spinning cube of potential doom[J].Communications of the ACM,2004,47(6):25-26
[3] 徐玮晟,张保稳,李生红.网络安全评估方法研究进展[J].信息安全与通信保密,2009,0(4)
[4] 马俊春,王勇军,孙继银,等.基于攻击图的网络安全评估方法研究[J].计算机应用研究,2012,9(3)
[5] Yu D,Frincke D.Improving the quality of alerts and predicting intruder’s next goal with hidden colored Petri-net[J].Computer Networks,2007,1(3):632-654
[6] Aven T.A unified framework for risk and vulnerability analysis covering both safety and security[J].Reliability Engineering and System Safety,2007,2(6):745-754
[7] 廖年冬,易禹,胡琦.动态实时网络安全风险评估研究[J].计算机工程与应用,2011,7(36)
[8] 陈锋,刘德辉,张怡,等.基于威胁传播模型的层次化网络安全评估方法[J].计算机研究与发展,2011,8(6):945-954

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!