• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学 ›› 2010, Vol. 32 ›› Issue (10): 8-11.

• • 上一篇    下一篇

基于攻击图的网络脆弱性量化评估研究

陈锋1,张怡1,鲍爱华2,苏金树1   

  1. (1.国防科学技术大学计算机学院,湖南 长沙 410073;2.国防科学技术大学信息系统与管理学院,湖南 长沙 410073)
  • 收稿日期:2008-10-24 修回日期:2008-12-03 出版日期:2010-09-29 发布日期:2010-09-29
  • 作者简介:陈锋(1979),男,江苏丹阳人,博士生,研究方向为网络与信息安全、密码学;张怡,博士,副研究员,研究方向为网络与信息安全;鲍爱华,博士生,研究方向为语义Web、人工智能;苏金树,教授,博士生导师,研究方向为网络与信息安全、路由技术等。
  • 基金资助:

    国家自然科学基金资助项目(90604006)

Research of Quantitative Vulnerability Assessment Based on Attack Graphs

CHEN Feng1,ZHANG Yi1,BAO Aihua2,SU Jin shu1   

  1. (1.School of Computer Science,National University of Defense Technology,Changsha 410073;
    2.School of Information Systems and Management,National University of Defense Technology,Changsha 410073,China)
  • Received:2008-10-24 Revised:2008-12-03 Online:2010-09-29 Published:2010-09-29

摘要:

目前,网络脆弱性量化评估面临的主要挑战之一是识别网络中存在的脆弱性和它们之间的相互关系以及由此产生的潜在威胁,本文提出了一种基于属性攻击图的网络脆弱性量化评估方法。首先对属性攻击图和有效攻击路径进行了形式化定义,在此基础上提出了采用“最大可达概率”指标来度量目标网络中关键属性集合的脆弱性,并设计了最大可达概率计算算法,该算法解决了属性攻击图的含圈路径问题;为解决实际评估中原始数据缺失的问题,提出了“可信度”的概念,它能有效反映缺失数据对评估结果的影响。

关键词: 攻击图, 有效攻击路径, 最大可达概率, 可信度

Abstract:

Attack graph is a modelbased vulnerability analysis technology. It may automatically analyze the interrelation among vulnerabilities in the network and the potential threat resulting from the vulnerabilities,which is one of problems the quantitative vulnerability assessment must solve. This paper proposes a novel quantitative vulnerability assessment method based on attributebased attack graphs. First attributebased attack graphs and valid attack paths are formally described, and maximal reachable probability is adopted to measure the vulnerability of the key attribute set of the target network. An algorithm for computing maximal reachable probability is presented to solve the problem of loop attack paths. Finally, because some data may not be obtained in practical assessment,the conception of creditability is introduced to measure the impact of absent data on the result.

Key words: attack graph, valid attack path, maximal reachable probability, creditability