首页 | 官方网站   微博 | 高级检索  
     

多阶段大规模网络攻击下的网络安全态势评估方法研究
引用本文:唐赞玉,刘宏.多阶段大规模网络攻击下的网络安全态势评估方法研究[J].计算机科学,2018,45(1):245-248.
作者姓名:唐赞玉  刘宏
作者单位:吉首大学信息科学与工程学院 湖南 吉首416000,湖南师范大学数学与计算机学院 长沙410081
基金项目:本文受国家自然科学基金项目(61662025)资助
摘    要:针对传统的网络安全态势评估方法一直存在评估偏差较大的问题,为了准确分析网络安全状况,提出一种新的多阶段大规模网络攻击下的网络安全态势评估方法。首先根据多阶段大规模网络攻击下的网络安全多数据源的特点,建立基于信息融合的多阶段大规模网络攻击下的网络安全态势评估模型;然后对大规模网络攻击阶段进行识别,计算网络攻击成功的概率和网络攻击阶段的实现概率;最后利用CVSS中的3个评价指标对网络安全态势进行评估。实例分析证明,所提方法更加符合实际应用,评估结果准确且有效。

关 键 词:多阶段大规模网络攻击  网络安全态势  评估方法
收稿时间:2017/6/26 0:00:00
修稿时间:2017/10/10 0:00:00

Study on Evaluation Method of Network Security Situation under Multi-stage Large-scale Network Attack
TANG Zan-yu and LIU Hong.Study on Evaluation Method of Network Security Situation under Multi-stage Large-scale Network Attack[J].Computer Science,2018,45(1):245-248.
Authors:TANG Zan-yu and LIU Hong
Affiliation:College of Information Science and Engineering,Jishou University,Jishou,Hunan 416000,China and School of Mathematics and Computer,Hunan Normal University,Changsha 410081,China
Abstract:For the traditional network security situation assessment method,there is always a problem of large evaluation bias.In order to accurately analyze the network security situation,a network security situation assessment method of multi-stage large-scale network attack under the new network security was proposed.Firstly,based on the characteri-stics of multiple data sources under multi-stage large-scale network attack,the network security situation assessment model of multi-stage large-scale network attack was established based on information fusion.Next,large-scale network attack stage was identified,and the success probability of network attack and implementation probability of network attack phase were calculated.Finally,three indexes in CVSS was used for network security situation assessment.The exam-ple analysis shows that the proposed method is more suitable for practical application,and the evaluation results are accurate and effective.
Keywords:Multi-stage large-scale network attack  Network security situation  Assessment method
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号