首页 | 官方网站   微博 | 高级检索  
     

基于吸收Markov链的网络入侵路径分析方法
引用本文:张凯,刘京菊.基于吸收Markov链的网络入侵路径分析方法[J].计算机科学,2021,48(5):294-300.
作者姓名:张凯  刘京菊
作者单位:国防科技大学电子对抗学院 合肥230037;中国酒泉卫星发射中心 甘肃 酒泉 732750;网络空间安全态势感知与评估安徽省重点实验室 合肥230037;国防科技大学电子对抗学院 合肥230037;网络空间安全态势感知与评估安徽省重点实验室 合肥230037
摘    要:从攻击者角度对网络进行入侵路径分析对于指导网络安全防御具有重要意义。针对现有的基于吸收Markov链的分析方法中存在的对状态转移情形考虑不全面的问题和状态转移概率计算不合理的问题,提出了一种基于吸收Markov链的入侵路径分析方法。该方法在生成攻击图的基础上,根据攻击图中实现状态转移所利用的漏洞的可利用性得分,充分考虑了非吸收节点状态转移失败的情况,提出了一种新的状态转移概率计算方法,将攻击图映射到吸收Markov链模型;利用吸收Markov链的状态转移概率矩阵的性质,计算入侵路径中节点的威胁度排序和入侵路径长度的期望值。实验结果表明,该方法能够有效计算节点威胁度排序和路径长度期望;通过对比分析,该方法的计算结果相比现有方法更符合网络攻防的实际情况。

关 键 词:网络安全  入侵路径分析  攻击图  吸收Markov链  节点威胁度排序  路径长度期望

Attack Path Analysis Method Based on Absorbing Markov Chain
ZHANG Kai,LIU Jing-ju.Attack Path Analysis Method Based on Absorbing Markov Chain[J].Computer Science,2021,48(5):294-300.
Authors:ZHANG Kai  LIU Jing-ju
Affiliation:(College of Electronic Engineering,National University of Defense Technology,Hefei 230037,China;Jiuquan Satellite Launch Center,Jiuquan,Gansu 732750,China;Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation,Hefei 230037,China)
Abstract:The analysis of network attack path from the perspective of attackers is of great significance to guide network security defense.The existing analysis methods based on absorbing Markov chain have some problems,such as incomplete consideration of state transition and unreasonable calculation of state transition probability.In order to solve these problems,this paper proposes an attack path analysis method based on absorbing Markov chain.Based on the generation of attack graph and the exploitability score of vulnerability,the situation that the failure state transition of non-absorbing nodes will be fully considered.In order to map the attack graph to the absorbing Markov chain model,this paper proposes a new method to calculate the state transition probability.Then,by using the properties of the state transition probability matrix of the absorbing Markov chain,it calculates the threat ranking of the nodes in the attack path and the expected length of the attack path.Then,the application feasibility of absorbing Markov chain with multi absorbing states is discussed.The results of the experiment show that the proposed method can effectively calculate the node threat ranking and path length expectation.Through comparative analysis,this method is more in line with the actual situation of network attack and defense than the existing methods.
Keywords:Network security  Attack path analysis  Attack graph  Absorbing Markov chain  Node threat ranking  Path length expectation
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号