• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2011, Vol. 33 ›› Issue (8): 45-52.

• 论文 • 上一篇    下一篇

效率优先的主机安全属性漏洞树建模研究

鲁智勇1,江亮2,唐朝京2   

  1. (1.63880部队,河南 洛阳 471003;2.国防科学技术大学电子科学与工程学院,湖南 长沙 410073)
  • 收稿日期:2009-12-28 修回日期:2010-04-05 出版日期:2011-08-25 发布日期:2011-08-25
  • 作者简介:鲁智勇(1969),男,河南信阳人,博士,高级工程师,研究方向为网络安全评估。江亮(1983),男,江西南昌人,博士,研究方向为信息安全与评估。唐朝京(1962),男,江苏武进人,博士,教授,研究方向为通信网信息安全与对抗。
  • 基金资助:

    国家自然科学基金资助项目(60872052)

Vulnerability Tree Modeling for  Host Security Attributes by Efficiency Priority

LU Zhiyong1,JIANG Liang2,TANG Chaojing2   

  1. (1.Corps 63880,Luoyang 471003;
    2.School of Electronics Science and Engineering,
    National University of Defense Technology,Changsha 410073,China)
  • Received:2009-12-28 Revised:2010-04-05 Online:2011-08-25 Published:2011-08-25

摘要:

攻击图、攻击树与攻击网是网络安全测试和评估的重要建模方法,但这些方法在建模过程中存在无序性以及在攻击选择上缺乏针对性。为克服以上不足,本文以目标网络中存在的漏洞为树的叶节点,以漏洞利用攻击方式为节点之间的边,对各个节点主机的安全属性分别进行攻击建模,并在综合分析攻击的成果效率和时间效率的基础上,提出了效率优先的主机安全属性漏洞树建模方法。最后,通过举例分析证实了所提方法的可行性和有效性。

关键词: 主机安全属性, 漏洞树, 效率, 评估, 建模

Abstract:

The attack graph, attack tree and attack net are important modeling methods for testing and evaluating network security, but these methods are disordered and short of pertinence when choosing attacks. To overcome these shortages, this paper models the vulnerability tree of the security attributes for each host, taking the network vulnerability as the leaf node and attacks as tree borders. After analyzing the fruit efficiency and time efficiency comprehensively, we present an approach for vulnerability tree modeling of the host security attributes by efficiency priority. Finally, the feasibility and validity of the approach are verified using some practical examples.

Key words: host security attribute;vulnerability tree;efficiency;evaluation;modeling