期刊文献+

基于信息融合的网络安全态势评估模型 被引量:167

A Network Security Situational Awareness Model Based on Information Fusion
在线阅读 下载PDF
导出
摘要 安全态势评估是近年来国内外在网络安全领域的研究热点之一.对已有的安全态势评估方法进行了详细分析和比较,针对网络安全中多数据源的特点,提出基于信息融合的网络安全态势评估模型,引入改进的D-S证据理论将多数据源信息进行融合,利用漏洞信息和服务信息,经过态势要素融合和节点态势融合计算网络安全态势,绘制安全态势曲线图,同时对态势计算结果进行时间序列分析,从而实现网络安全趋势的预测.最后利用网络实例数据,对所提出的网络安全态势评估模型和算法进行了验证,结果表明该模型比已有成果更加有效和准确. Security situational awareness has become a hot topic in the area of network security research in recent years, which attracts the interest of more and more domestic and foreign researchers. The existing security situational awareness methods are analyzed and compared in detail. Considering the characteristics of multi-source information in network security research, a new network security situational awareness model based on information fusion is proposed. This model fuses multi-source information from a mass of logs by introducing the modified D-S evidence theory, gets the values of nodes security situational awareness by situational factors fusion using attacks threat and vulnerability information which network nodes have and successful attacks depend on, computes the value of network security situational awareness by nodes situation fusion using service information of the network nodes, and draws the security-situation-graph of network. Then, it analyzes the time series of the computing results by ARMA model to forecast the future threat in network security. Finally an example of actual network datasets is given to validate the network security situational awareness model and algorithm. The results show that this model and algorithm is more effective and accurate than the existing security situational awareness methods.
出处 《计算机研究与发展》 EI CSCD 北大核心 2009年第3期353-362,共10页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(2006AA01Z437 2007AA01Z475 2006AA01Z412 2006AA01Z433)~~
关键词 安全态势评估 信息融合 D—S证据理论 时间序列分析 预测 security situational awareness information fusion D-S evidence theory time seriesanalysis forecast
  • 相关文献

参考文献13

  • 1Lakkaraju K, Yurcik W, Lee A J. NVisionIP: NetFlow visualizations of system state for security situational awareness [C] //Proc of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York: ACM, 2004:65-72
  • 2Yin Xiaoxin, Yurcik W, Treaster M, et al. VisFlowConnect: NetFlow visualizations of link relationships for security situational awareness [C] //Proc of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York: ACM, 2004:26-34
  • 3朱亮,王慧强,郑丽君.网络安全态势可视化研究评述[OL].[2008-01-08].http://www.paper.edu.cn/downloadpaper.php?serial_number=200607-36
  • 4Bass T. Intrusion detection systems & multisensor data fusion: Creating Cyberspace Situational Awareness [J].Communications of the ACM, 2000, 43(4): 99-105
  • 5D'Ambrosio B. Security situation assessment and response evaluation (SSARE) [C]//DISCEX'01. Proceedings: DARPA Information Survivability Conference & Exposition Ⅱ. Los Alamitos: IEEE Computer Society, 2001:387-394
  • 6Gorodetsky V, Karsaev O, Samoilov V. On-line update of situation assessment based on asynchronous data streams [C]//Knowledge Based Intelligent Information and Engineering Systems. Berlin/Heidelberg: Springer, 2004 : 1136-1142
  • 7Yegneswaran V, Barford P, Paxson V. Using Honeynets for Internet situational awareness [C/OL]//Proc of ACM/USENIX Hotnets Ⅳ. 2005 [2008-01-12]. http://www. icir. org/vern/papers/sit-aware-hotnet05. pdf
  • 8陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:351
  • 9张海霞,苏璞睿,冯登国.基于攻击能力增长的网络安全分析模型[J].计算机研究与发展,2007,44(12):2012-2019. 被引量:27
  • 10李弼程,王波,魏俊,钱曾波,黄玉琪.一种有效的证据理论合成公式[J].数据采集与处理,2002,17(1):33-36. 被引量:208

二级参考文献19

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:313
  • 2蒋屹新,林闯,曲扬,尹浩.基于Petri网的模型检测研究[J].软件学报,2004,15(9):1265-1276. 被引量:20
  • 3冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:31
  • 4Dan Farmer, Wietse Venema. Improving the security of your site by breaking into it [R]. USENET Newsgroup Comp. Security Unix, Tech Rep: ITSTD-721-FR-90-21, 1993.
  • 5Internet Scanner. Internet Security Systems [OL]. http:// www. iss. net/, 2002.
  • 6Nesssus Homepage [OL]. http : // www. nessus. org/, 2002.
  • 7C A Phillips, L P Swiler. A graph-based system for network vulnerability analysis [C]. New Security Paradigms Workshop, Charlotte sville, VA, 1998.
  • 8L P Swiler, C Phillips, D Ellis, et al. Computer-attack graph generation tool [C]. The DARPA Information Survivability Conference and Exposition, Los Alamitos, CA, 2000.
  • 9P Ammann, D Wijesekera, S Kaushik. Scalable graph-based vulnerability analysis [C]. The 9th ACM Conf on Computer and Commuincations Security, Washington, DC, 2002.
  • 10R Ritchey, P Ammann. Using model checking to analyze network vulnerabilities [C]. IEEE Symp on Security and Privacy, Oakland, CA, 2001.

共引文献576

同被引文献1055

引证文献167

二级引证文献1354

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部