通信学报 ›› 2021, Vol. 42 ›› Issue (1): 1-17.doi: 10.11959/j.issn.1000-436x.2021004

• 学术论文 •    下一篇

基于动态概率攻击图的云环境攻击场景构建方法

王文娟, 杜学绘, 单棣斌   

  1. 信息工程大学,河南 郑州 450001
  • 修回日期:2020-09-23 出版日期:2021-01-25 发布日期:2021-01-01
  • 作者简介:王文娟(1981- ),女,河南鹤壁人,信息工程大学博士生、副教授,主要研究方向为网络与信息安全、云计算安全。
    杜学绘(1963- ),女,河南新乡人,博士,信息工程大学教授、博士生导师,主要研究方向为网络与信息安全、云计算安全、大数据安全等。
    单棣斌(1983- ),男,河北邯郸人,信息工程大学博士生、讲师,主要研究方向为网络与信息安全、大数据安全。
  • 基金资助:
    国家自然科学基金资助项目(61802436);国家重点研发计划基金资助项目(2016YFB050190104)

Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph

Wenjuan WANG, Xuehui DU, Dibin SHAN   

  1. Information Engineering University, Zhengzhou 450001, China
  • Revised:2020-09-23 Online:2021-01-25 Published:2021-01-01
  • Supported by:
    The National Natural Science Foundation of China(61802436)

摘要:

针对复杂多步攻击检测问题,研究面向云计算环境的攻击场景构建方法。首先,构建了动态概率攻击图模型,设计了概率攻击图更新算法,使之能够随着时空的推移而周期性更新,从而适应弹性、动态性的云计算环境。其次,设计了攻击意图推断算法和最大概率攻击路径推断算法,解决了误报、漏报导致的攻击场景错误、断裂等不确定性问题,保证了攻击场景的准确性。同时将攻击场景随动态概率攻击图动态演化,保证了攻击场景的完备性和新鲜性。实验结果表明,所提方法能够适应弹性、动态的云计算环境,还原出攻击者完整的攻击渗透过程,重构出高层次的攻击场景,为构建可监管可追责的云环境提供了一定的依据和参考。

关键词: 云计算, 攻击场景, 动态概率攻击图, 攻击意图, 最大概率攻击路径

Abstract:

Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.

Key words: cloud computing, attack scenario, dynamic probabilistic attack graph, attack intention, maximum probability attack path

中图分类号: 

No Suggested Reading articles found!