首页 | 官方网站   微博 | 高级检索  
     

基于模拟攻击的高校网络安全风险评估研究
引用本文:史姣丽.基于模拟攻击的高校网络安全风险评估研究[J].计算机工程与科学,2012,34(12):51-55.
作者姓名:史姣丽
作者单位:九江学院信息科学与技术学院,江西九江,332005
摘    要:针对高校网络目前存在的安全风险,提出一种新型的基于模拟攻击的高校网络安全风险评估模型。该模型综合考虑了单机脆弱性和网络攻击威胁,首先结合原有基于单机脆弱性测出的风险值,模拟攻击者利用网络弱点的入侵过程,产生攻击状态图;然后基于生成的攻击状态图和原有风险值,识别攻击者入侵网络所利用的攻击行为、可能路线及导致的安全状态变化,评估潜在威胁的位置;并对新方法的风险值给出了定量分析,从而为针对性地实施风险控制决策提供更准确的依据。实验结果表明,该模型是正确的,并且平均要比目前存在的风险评估模型多发现大约50%的安全风险。由此可以看出,本模型方法的评估结论较传统方法更为准确。

关 键 词:高校网络安全  模拟攻击  风险评估

Research for the Risk Assessment of University Network Security Based on Simulated Attack
SHI Jiao-li.Research for the Risk Assessment of University Network Security Based on Simulated Attack[J].Computer Engineering & Science,2012,34(12):51-55.
Authors:SHI Jiao-li
Affiliation:SHI Jiao-li (College of Information Science and Technology,Jiujiang University,Jiujiang 332005,China)
Abstract:For the existing network security risks, this paper provides a novel network security risk assessment model based on simulated attack, which comprehensively considers the vulnerabilities of single computer and network attack menace. Firstly, the model uses the assessment value based on the vulnerabilities of single computer to simulate the intrusion process of attacker using the network weakness initially and produce the attack state chart. Secondly, the model identifies the attack behaviors, the possible attack line, the change of security state and the location of potential threat according to the attack state chart and the initial assessment value. Finally, the paper gives the quantitative analysis on the new assessment value by the new method, and provides a more accurate basis for the implement on risk control decision pointedly. The experimental results show that this model is correct, and can find out about more 50% security risk than the existing risk assessment models averagely. It means that the assessment results estimated by the model designed in this paper are more accurate than the traditional methods.
Keywords:university network security  simulated attack  risk assessment
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号