Chinese Journal of Network and Information Security ›› 2019, Vol. 5 ›› Issue (6): 58-66.doi: 10.11959/j.issn.2096-109x.2019063
• Papers • Previous Articles Next Articles
Qiang LENG1,Yingjie YANG1,Dexian CHANG1,Ruixuan PAN1,Ying CAI2,Hao HU1()
Revised:
2019-04-08
Online:
2019-12-15
Published:
2019-12-14
Supported by:
CLC Number:
Qiang LENG,Yingjie YANG,Dexian CHANG,Ruixuan PAN,Ying CAI,Hao HU. Dynamic defense decision method for network real-time confrontation[J]. Chinese Journal of Network and Information Security, 2019, 5(6): 58-66.
"
序号 | 防御动作名称 | 防御强度 | 防御支出 |
d1 | Limit packets form ports | 0.8 | 3 |
d2 | Install Oracle patch | 0.8 | |
d3 | Reinstall Listener program | 0.8 | |
d4 | Uninstall delete Trojan | 0.7 | |
d5 | Limit access to MDSYS.SDO_CS | 0.7 | |
d6 | Renew root data | 0.6 | 2 |
d7 | Restart Database server | 0.6 | |
d8 | Limit SYN/ICMP packets | 0.5 | |
d9 | ADD physical resource | 0.5 | |
d10 | Repair database | 0.4 | |
d11 | Correct homepage | 0.4 | 1 |
d12 | Delete suspicious account | 0.3 | |
d13 | Redeploy firewall rule and fil-trate malicious packets | 0.3 | |
d14 | Patch SSH on Ftp | 0.2 |
[1] | FISHER J , LINGER R . Survivability:protecting your critical systems[J]. IEEE Journal of Internet Computing, 1999,3(6): 55-63. |
[2] | WANG CL , MIAO Q , DAI YQ . Network survivability analysis based on stochastic game model[J]. Multimedia Information Networking and Security, 2012,55(10): 99-104. |
[3] | 黄永洪, 吴一凡, 杨豪璞 ,等. 基于攻击图的APT脆弱节点评估方法[J]. 重庆邮电大学学报(自然科学版), 2017,29(4): 535-541. |
HUANG Y H , WU Y F , YANG H P ,et al. Graph-based vulnerability assessment for APT attack[J]. Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition), 2017,29(4): 535-541. | |
[4] | HU H , ZHANG H Q , LIU Y L ,et al. Security metric methods for network multistep attacks using AMC and big data correlation analysis[J]. Security and Communication Networks, 2018. |
[5] | 胡浩, 叶润国, 张红旗 ,等. 面向漏洞生命周期的安全风险度量方法[J]. 软件学报, 2018,29(5). |
HU H , YE R G , ZHANG H Q ,et al. Vulnerability life cycle oriented security risk metric method[J]. Journal of Software, 2018,29(5). | |
[6] | 吴迪, 连一峰, 陈恺 . 一种基于攻击图的安全威胁识别和分析方法[J]. 计算机学报, 2012,35(9): 1938-1950. |
WU D , LIAN Y F , CHEN K ,et al. A security threats identification and analysis method based on attack graph[J]. Chinese Journal of Computers, 2012,35(9): 1938-1950. | |
[7] | HOMER J , ZHANG S , OU X ,et al. Aggregating vulnerability metrics in enterprise networks using attack graphs[J]. Journal of Computer Security, 2013,21(4): 561-597. |
[8] | 王会梅, 鲜明, 王国玉 . 基于扩展网络攻击图的网络攻击策略生成算法[J]. 电子与信息学报, 2011,33(12): 3015-3021. |
WANG H M , XIAN M , WANG G Y . A network attack decision-making algorithm based on the extended attack graph[J]. Journal of Electronics & Information Technology, 2011,33(12): 3015-3021. | |
[9] | WANG H , CHEN Z F , ZHAO J P ,et al. A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow[J]. Special Section on Convergence of Sensor Networks,Cloud Computing,and Big Data in Industrial Internet of Thing, 2018,(6): 8599-8609. |
[10] | WANG Y Z , LIN C , CHENG X Q ,et al. Evolutionary game model and analysis methods for network group behavior[J]. Chinese Journal of Computer, 2015,38(2): 282-300. |
[11] | SHEN S G , LI Y J , XU H Y ,et al. Signaling game based strategy of intrusion detection in wireless sensor networks[J]. Computer&Mathematics with Applications, 2011,62(6): 2404-2416. |
[12] | DORASZEL A . Preventing DDoS attacks in wireless sensor networks:a repeated game theory approach[J]. ACM Transactions on Information and System Security, 2015,13(2): 145-153 |
[13] | 张恒巍, 李涛, 黄世锐 . 基于攻防微分博弈的网络安全防御决策方法[J]. 电子学报, 2018,46(6): 1428-1435. |
ZHANG H W , LI T , HUANG S R . Network defense decision-making method based on attack-defense differential game[J]. Acta Electronica Sinica, 2018,46(6): 1428-1435. | |
[14] | HU H , LIU Y L , ZHANG H Q ,et al. Optimal network defense strategy selection based on incomplete information evolutionary game[J]. IEEE Access, 2018,6: 29806-29821. |
[15] | GORDON L , LOEB M , LUCYSHYN W ,et al. 2015 CSI/FBI computer crime and security survey[C]// 2015 Computer Security Institute. 2015: 48-64. |
[16] | ZHAN X Z . Matrix theory[D]. American Mathematical Society, 2010. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|