期刊文献+

节点相关的隐马尔可夫模型的网络安全评估 被引量:12

Network Security Assessment Based on Node Correlated HMM
原文传递
导出
摘要 针对基于隐马尔可夫(HMM)的网络风险评估中未考虑网络节点相关性的问题,结合图论,建立节点关联(NNC)状态转换矩阵,以入侵告警值(IDS)为输入,用改进的HMM模型计算出攻击路径.通过模型能进一步得到任意长度攻击序列的攻击成功率.实验结果证明,该方法简捷有效,有利于发现网络节点的脆弱性,掌握网络安全状况. Aimed at the problem that the node correlation in network is not considered in hidden Markov model (HMM) network risk assessment, combining graph theory model, the network node correlation (NNC) state transition matrix is built. With the intrusion defective system (IDS) alert as input, using modified HMM model the attacking route is figured out. Furthermore, the successful probability of any attacking sequence with any length can be got as well. The method can help to find vulnerabilities of network nodes, and reflect network risk well. Experiment demonstrates the validity of it.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2010年第6期121-124,共4页 Journal of Beijing University of Posts and Telecommunications
基金 陕西省自然科学基金项目(2009JM8001-1) 军队武器装备科研项目
关键词 隐马尔可夫模型 网络节点关联性 图论 网络安全 hidden Markov model network node correlation graph theory network security
作者简介 龙门(1982-),女,博士生,E—mail:betty506@tom.com; 夏靖波(1963-),男,教授,博士生导师.
  • 相关文献

参考文献8

二级参考文献35

  • 1陆余良,夏阳.主机安全量化融合模型研究[J].计算机学报,2005,28(5):914-920. 被引量:29
  • 2王益丰,李涛,胡晓勤,宋程.一种基于人工免疫的网络安全实时风险检测方法[J].电子学报,2005,33(5):945-949. 被引量:30
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 4张永铮,方滨兴,迟悦,云晓春.网络风险评估中网络节点关联性的研究[J].计算机学报,2007,30(2):234-240. 被引量:52
  • 5Ortalo R, Deswarte Y, Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security[J]. IEEE Trans on Software Engineering, 1999, 25(5): 633-651.
  • 6Evans S, Waller J. Risk-based security engineering through the eyes of the adversary[ C] //Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop. New York: IEEE Computer Society Press, 2005 : 158-165.
  • 7Howard M, Pincus J, Wing J M. Computer Securing in the 21st Century. Springer, 2005:109-137
  • 8Ortalo R, Deswarte Y, Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 1999, 25 (5) : 633-651
  • 9Ammann P, Wijesekera D, Kaushik S. Scalable, graphbased network vulnerability analysis//Proceedings of the 5th ACM Conference on Computer and Communications Security. Washington DC, USA, 2002:217-224
  • 10Gehani A, Kedem G. Rheostat: Real-time risk management//Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection. French Riviera, France, 2004:296-314

共引文献100

同被引文献127

引证文献12

二级引证文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部