资源描述:
《层次化网络安全威胁态势量化评估方法》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、ISSN1000-9825,CODENRUXUEWE-mail:jos@iscas.ac.cnJournalofSoftware,Vol.17,No.4,April2006,pp.885−897http://www.jos.org.cnDOI:10.1360/jos170885Tel/Fax:+86-10-62562563©2006byJournalofSoftware.Allrightsreserved.∗层次化网络安全威胁态势量化评估方法1+11,21陈秀真,郑庆华,管晓宏,林晨光1(西安交通大学网络化系统与信息安全研究中心制造系统工程
2、国家重点实验室,陕西西安710049)2(清华大学智能与网络化系统研究中心,北京100084)QuantitativeHierarchicalThreatEvaluationModelforNetworkSecurity1+11,21CHENXiu-Zhen,ZHENGQing-Hua,GUANXiao-Hong,LINChen-Guang1(StateKeyLaboratoryofManufacturingSystem,CenterforNetworkedSystemsandInformationSecurity,Xi’anJiaoton
3、gUniversity,Xi’an710049,China)2(CenterforIntelligentandNetworkedSystems,TsinghuaUniversity,Beijing100084,China)+Correspondingauthor:Phn:+86-29-82663939,Fax:+86-29-82664233,E-mail:chenxz@sjtu.edu.cnChenXZ,ZhengQH,GuanXH,LinCG.Quantitativehierarchicalthreatevaluationmodelfor
4、networksecurity.JournalofSoftware,2006,17(4):885−897.http://www.jos.org.cn/1000-9825/17/885.htmAbstract:Evaluatingsecuritythreatstatusisveryimportantinnetworksecuritymanagementandanalysis.Aquantitativehierarchicalthreatevaluationmodelisdevelopedinthispapertoevaluatesecurit
5、ythreatstatusofacomputernetworksystemandthecomputationalmethodisdevelopedbasedonthestructureofthenetworkandtheimportanceofservicesandhosts.Theevaluationpolicyfrombottomtotopandfromlocaltoglobalisadoptedinthismodel.Thethreatindexesofservices,hostsandlocalnetworksarecalculat
6、edbyweightingtheimportanceofservicesandhostsbasedonattackfrequency,severityandnetworkbandwidthconsumption,andthesecuritythreatstatusisthenevaluated.Theexperimentresultsshowthatthismodelcanprovidetheintuitivesecuritythreatstatusinthreehierarchies:services,hostsandlocalnetwo
7、rkssothatsystemadministratorsarefreedfromtediousanalysistasksbasedonthealarmdatasetstohaveoverallsecuritystatusoftheentiresystem.Itisalsopossibleforthemtofindthesecuritybehaviorsofthesystem,toadjustthesecuritystrategiesandtoenhancetheperformanceonsystemsecurity.Thismodelis
8、valuableforguidingthesecurityengineeringpracticeanddevelopingthetoolofsecurityriskevaluat