Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (1): 143-156.doi: 10.11959/j.issn.2096-109x.2021015

• Papers • Previous Articles     Next Articles

Two-layer threat analysis model integrating macro and micro

Cheng SUN, Hao HU, Yingjie YANG, Hongqi ZHANG   

  1. Information Engineering University, Zhengzhou 450001, China
  • Revised:2020-10-07 Online:2021-02-15 Published:2021-02-01
  • Supported by:
    The National Natural ScienceFoundation of China(61902427)

Abstract:

The existing threat analysis models failed to comprehensively analyze the propagation of advanced security threats integrating the threat development trend and propagation path.In order to solve the problem, a two-layer threat analysis model named TL-TAM was established.The upper layer of the model depicted the threat development trend.The lower layer depicted the threat propagation path considering social engineering and networks can.Based on the model, prediction algorithm of threat development was proposed.The experimental result shows that the model can comprehensively analyze the threat propagation at multiple levels, overcome the defect that the threat analysis model based on attack graph is limited to technical vulnerability attack, and is more suitable for dynamic tracking analysis of advanced security threats.

Key words: two-layer model, propagation path, social engineering, network scan

CLC Number: 

No Suggested Reading articles found!