期刊文献+

综合网络安全态势和资产价值因素的动态风险评估

Dynamic Risk Assessment Considering Network Security Situation and Asset Value
在线阅读 下载PDF
导出
摘要 石油化工行业上下游产业链应用复杂,装置设备规模大,核心资产如果遭到破坏将严重影响生产安全,造成重大损失。为实现快速识别网络安全风险并决策,针对当前攻击图模型较少考虑网络环境动态变化和资产价值的问题,提出了一种动态攻击图概率计算模型。通过计算原子攻击相对于观测事件的后验概率,拟合脆弱性风险随时间变化的衰减函数,结合攻击图中属性节点的资产价值,动态计算攻击图中的最大累积概率路径和最大风险点。结果表明,所提动态攻击图评估技术更具有合理性和时效性,对制定网络安全策略和实施防护措施具有重要意义。 The upstream and downstream industrial chain of the petrochemical industry is characterized by complex applications and large-scale devices,and if the core assets are damaged,it will seriously affect production safety and cause significant losses.In order to quickly recognize network security risks and make decisions,this paper proposes a dynamic attack graph probability computation model for the problem that current attack graph models less consider the dynamic changes of the network environment and the value of assets.By calculating the a posterior probability of atomic attack relative to the observed event,fitting changes of vulnerability risk over time,and considering the asset values of the attribute nodes in the attack graph,the paper dynamically calculates the maximum cumulative probability paths and maximum risk points in the attack graph.Experimental results indicate that the proposed method is more reasonable and effective,and has important value for developing network security strategies and implementing protective measures.
作者 韩百然 刘雷刚 郭长杰 高翔 HAN Bairan;LIU Leigang;GUO Changjie;GAO Xiang(China Petroleum Planning and Engineering Institute,Beijing 100083,China)
出处 《通信技术》 2025年第1期99-106,共8页 Communications Technology
关键词 风险评估 网络安全度量 网络安全运营 脆弱性 risk assessment network security measurement network security operation vulnerability
  • 相关文献

参考文献9

二级参考文献97

  • 1鲍旭华,戴英侠,冯萍慧,朱鹏飞,魏军.基于入侵意图的复合攻击检测和预测算法[J].软件学报,2005,16(12):2132-2138. 被引量:40
  • 2冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:31
  • 3诸葛建伟,韩心慧,叶志远,邹维.基于扩展目标规划图的网络攻击规划识别算法[J].计算机学报,2006,29(8):1356-1366. 被引量:17
  • 4Mehta V, Bartzis C, Zhu H F. Ranking attack graphs//Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID). Hamburg, Germany, 2006, 127-144.
  • 5Sawilla R, Ou X M. Identifying critical attack assets in dependency attack graphs//Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS). Malaga, Spain, 2008:18-34.
  • 6Ou X M, Boyer W F. A scalable approach to attack graph generation//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS). Alexandria, USA, 2006. 336-345.
  • 7Wang L Y, Tania I. An attack graph-based probabilistic security metric//Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec). London, UK, 2008:283-296.
  • 8Homer J, Ou X M, Schmidt D. A sound and practical approach to quantifying security risk in enterprise networks. Kansas State University: Technical Report 2009-3, 2009.
  • 9Singhal A, Ou X M. Security risk analysis of computer networks: Techniques and challenge//Proceedings of the 16th ACM Computer and Communications Security(CCS). Chicago, USA, 2009.
  • 10Wang L Y, Singhal A, Jajodia S. Measuring the overall security of network configurations using attack graphs//Proceedings of the 21th IFIP WG 11. 3 Working Conference on Data and Applications Security (DBSee). Redondo Beach, CA, USA, 2007:98-112.

共引文献215

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部