期刊文献+

网络化系统安全态势评估的研究 被引量:74

Study on Evaluation for Security Situation of Networked Systems
在线阅读 下载PDF
导出
摘要 针对当前网络安全评估系统不能提供有用态势信息的缺陷,利用入侵检测系统的日志库,结合服务、主机自身的重要性及网络系统的组织结构,提出了采用自下而上、先局部后整体评估策略的层次化安全态势定量评估模型及其相应计算方法.该方法在攻击频率及攻击严重性的统计分析基础之上,利用服务和主机自身的重要性因子进行加权,计算网络系统内服务、主机以及整个网络系统的风险指数,进而评估分析安全态势.通过使用HoneyNet数据进行实验测试表明,该模型能够准确评估服务、主机和网络系统3个层次的安全态势,给管理员提供直观的安全态势曲线. Aiming at the deficiency that is unable to provide useful security situation information encountered in the current security evaluation systems, a hierarchical and quantitative model, which is used to evaluate security situation of networked systems, and its corresponding computation methods are proposed based on the importance of service, host, and the structure of the network system. This model adopts the evaluation policy from bottom to top and from local to global, calculates the risk indexes of service, host and whole network system by weighting the importance of service and host based on the analysis of attack frequency and its severity, and further evaluates their security situation. Experiments on the HoneyNet dataset show that this system can evaluate the security situation in three levels: service, host and local area network system. It provides system administrators with system intuitive security situation curve and releases them from the exhausting task of alert analysis.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2004年第4期404-408,共5页 Journal of Xi'an Jiaotong University
基金 国家杰出青年基金资助项目 (6970 0 2 5) 国家自然科学基金资助项目 (60 2 43 0 0 1 ) 国家高技术研究发展计划资助项目(2 0 0 1AA1 40 2 1 3 )
关键词 网络安全 安全评估 态势评估 态势曲线 风险指数 入侵检测系统 Condition monitoring Hierarchical systems Local area networks
  • 相关文献

参考文献5

  • 1[1]Tim B. Multisensor data fusion for next generation distributed intrusion detection systems[A]. 1999 IRIS National Symposium on Sensor and Data Fusion, Laurel,USA,1999.
  • 2[2]Tim B. Intrusion systems and multisensor data fusion: creating cyberspace situational awareness[J]. Communications of the ACM, 2000, 43(4): 99~105.
  • 3[3]Martin R, Chris G.Snort users manual, Snort release 2.0.0[EB/OL].http://www.snort.org/docs/SnortUsersManual.pdf,2002-07-06.
  • 4[4]Tim B, Roger R. Defense-in-depth revisited:qualitative risk analysis methodology for complex network-centric operations[EB/OL].http://www.silkroad.com/papers/pdf/archives/defense-in-depth-revisited-original.pdf,2002-07-23.
  • 5[5]Honeynet Project.Know your enemy: statistics[EB/OL].http://www.HoneyNet.org/papers/stats/, 2001-07-22.

同被引文献423

引证文献74

二级引证文献587

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部