期刊文献+

信息安全风险概率计算的贝叶斯网络模型 被引量:19

Planning Exploitation Graph-Bayesian networks Model for Information Security Risk Frequency Measurement
在线阅读 下载PDF
导出
摘要 构建了一个基于贝叶斯网络的信息安全风险概率计算模型,并保证其可扩展性、精确性和客观性.模型的网络结构以规划渗透图表现,模型网络参数由专家知识确定并利用贝叶斯学习对其进行更新.实例分析表明构建的模型可以正确量化评估信息安全风险概率. A planning exploitation graph-bayesian networks model that can be applied in measurement of information security risk frequency is proposed, and the model's scalability, accuracy and objectivity are achieved. The model graph structure is deter- mined by Planning Exploitation Graph, the local conditional probability distributions are computed by combination of expertise knowledge and the maximum entropy prior probability distribution method,and the model parameters are updated with training data by Bayesian networks learning. The analysis of the example shows the model could evaluate the information security risk frequency successfully.
出处 《电子学报》 EI CAS CSCD 北大核心 2010年第B02期18-22,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.70771109)
关键词 风险评估 贝叶斯网络 规划渗透图 贝叶斯学习 risk measurement Bayesian networks planning exploitation graph Bayesian networks learning
  • 相关文献

参考文献11

  • 1Swanson M, et al. Security Metrics Guide for Information Technology Systems: NIST Special Publication 800-55 [ R ]. NY USA:National Institute of Standards and Technology,2003.
  • 2Mell P, Scarfone K, Romanosky S. Common vulnerability scoring system[ J]. IEEE Security & Privacy Magazine,2006,4(6) : 85 - 89.
  • 3Wang L, Tania Islam, Tao Long.An attack graph-based probabilistic security metric [ A ]. Proceedings of 22nd International Federation for Information Processing[ C]. DAS USA: Springer Berlin/Heidelberg, 2008.283 - 296.
  • 4Sushil Jajodia. Topological analysis of network attack vulnerability[ A]. Proceedings of the 2nd ACM Symposium on Informarion, Computer and Communications Security[ C] .NY USA: ACM Press, 21207.2 - 2.
  • 5P Ammann, D Wijesekera, S Kaushik. Scalable, graph-based network vulnerability analysis [ A ]. Proceedings of the 9th ACM Conference on Computer and Communications Security [C]. Washington DC USA: ACM Press,2002.217 - 224.
  • 6Y Liu, H Man. Network vulnerability assessment using bayesian networks[ A ]. SPIE' 05 [ C ]. Orlando FL USA: ACM Press, 2005.61 - 71.
  • 7Marcel Frigault, Wang L. Measuring network security using bayesian network-based attack graphs[ A]. Annual IEEE International Computer Software and Applications Conference[ C ]. Washington USA: IEEE Computer Society,2008.698- 703.
  • 8Wang L, Jajodia S. Measuring the overall security of network configurations using attack graphs[ A] .Proceedings of 21st IFIP WG 11.3 Working Conference on Data and Applications Security[ C ]. Montreal USA: Springer Berlin, 2007.98 - 112.
  • 9王桢珍,武小悦,刘忠.一种基于智能规划的信息安全风险过程建模方法[J].电子学报,2008,36(B12):76-80. 被引量:4
  • 10Oleg Mikhail Sheyner. Scenarios Graphs and Attack Graphs [ D]. Pittsburgh, Pennsylvania, USA: Department of Computer Science, Carnegie MeUon University,2004.

二级参考文献11

  • 1宋泾舸,查建中,陆一平.智能规划研究综述——一个面向应用的视角[J].智能系统学报,2007,2(2):18-25. 被引量:8
  • 2毛撼东.基于逻辑渗透图模型的网络安全风险评估方法研究[D].长沙:国防科技大学研究生院,2008.
  • 3Ou Xin-ming. A scalable approach to attack graph generation [A]. Proceedings of the 13th ACM Conference on Computer and Communications Security[ C ]. Alexandria Virginia, USA: ACM, 2006. 336 - 345.
  • 4O Sheyner. Scenarios Graphs and Attack Graphs[ D ]. Pitts-burgh,Pennsylvania, USA: Department of Computer Science, Carnegie Mellon University, 2004.
  • 5P Ammann, D Wijesekera, S Kaushik. Scalable, graph-based network vulnerability analysis [ A ]. Proceedings of the 9th ACM Conference on Computer and Communications Security [ C]. Washington DC, USA: ACM,2002.217 - 224.
  • 6Li Wei. An approach to model network exploitations using exploitation graph[ J]. SIMULATION, 2006,82(8) : 523 - 541.
  • 7L Swiler, C Philips, D Ellis, et al. Computer-attack graph generation tool[ A]. DARPA Information Survivability Conference and Exposition Proceedings [ C ]. Anaheim, CA, USA: IEEE, 2002.307 - 321.
  • 8Lippmann R, K W Ingols. An Annotated Review of Past Papers on Attack Graphs[ R ]. Project Report [A], Lexington, Massachusetts: Lincoln Laboratory of Massachusetts Institute of Technology, 2005.
  • 9Wei Li. An Approach to Graph-Based Modeling of Network Exploitations[D] .Mississippi State: Mississippi State University,2005.
  • 10Russell,Stuart,Peter Norvig.人工智能[M].北京:人民邮电出版社,2004.

共引文献3

同被引文献146

引证文献19

二级引证文献86

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部