计算机应用 ›› 2015, Vol. 35 ›› Issue (8): 2169-2173.DOI: 10.11772/j.issn.1001-9081.2015.08.2169

• 信息安全 • 上一篇    下一篇

基于累积效应的网络脆弱性扩散分析方法

李艳, 黄光球, 张斌   

  1. 西安建筑科技大学 管理学院, 西安 710055
  • 收稿日期:2015-02-11 修回日期:2015-03-26 出版日期:2015-08-10 发布日期:2015-08-14
  • 通讯作者: 李艳(1984-),男(蒙古族),河北承德人,博士,CCF会员,主要研究方向:信息对抗、网络安全,sy_liyan137@126.com
  • 作者简介:黄光球(1964-),男,湖南桃源人,教授,博士,主要研究方向:网络安全、复杂系统建模、分析与控制、系统工程; 张斌(1984-),男,陕西渭南人,博士,主要研究方向:网络安全、系统工程。
  • 基金资助:

    陕西省科学技术研究发展计划项目(2013K1117);陕西省重点学科建设专项资金资助项目(E08001);陕西省教育厅科技计划项目(12JK0789)。

New network vulnerability diffusion analysis method based on cumulative effect

LI Yan, HUANG Guangqiu, ZHANG Bin   

  1. School of Management, Xi'an University of Architecture and Technology, Xi'an Shaanxi 710055, China
  • Received:2015-02-11 Revised:2015-03-26 Online:2015-08-10 Published:2015-08-14

摘要:

网络脆弱性评估是一种主动防范技术,意在攻击发生之前对安全态势进行分析进而制定防御措施,但传统的定量分析模型不能对实体间动态交互关系有很好的展现,而且大都不能得出风险扩散的全局化结果。将脆弱性扩散过程类比于社会网络中影响力传播过程,提出了基于累积效应的网络脆弱性扩散分析方法,定义的脆弱性扩散分析模型给出了细粒度级的主体关系结构,利用攻击效果累积特性提出的分析算法可以更准确地刻画脆弱性扩散规则,保证更好的影响范围。最后对该模型和算法进行了实例验证,在模型描述简洁性、分析结果准确性、安全建议合理性等方面的横向比较分析,验证了模型在评估结果直观性和制定成本最小安全措施等方面的优势。

关键词: 脆弱性扩散, 网络风险评估, 网络安全, 累积效应, 攻击模型

Abstract:

Network vulnerability assessment which intends to safety situation analysis and establishment of defensive measures before attack is a kind of active defense technology, but the traditional quantitative analysis models cannot show the dynamic interactive relationship between entities, and most of them cannot get global results for risk diffusion. With reference to the influence of social network in the process of communication, a new network vulnerability diffusion analysis method based on cumulative effect was proposed. The defined vulnerability diffusion analysis model described subject relation structure in a more detailed level, and the algorithm proposed by using the accumulation characteristics in attack effects described vulnerability diffusion rule more accurately to ensure better influence range. At last, the model and algorithm were verified by a typical example, the horizontal comparison analysis on some aspects such as simplicity of the model description, accuracy of the analysis results, rationality of the safety recommendations were given. The results show that the method has an advantage in visual assessment results and the formulation of the cost minimum security measures.

Key words: vulnerability diffusion, network risk assessment, network security, cumulative effect, attack model

中图分类号: