通信学报 ›› 2022, Vol. 43 ›› Issue (2): 89-99.doi: 10.11959/j.issn.1000-436x.2022030
杨宏宇1,2, 袁海航2, 张良3
修回日期:
2022-01-11
出版日期:
2022-02-25
发布日期:
2022-02-01
作者简介:
杨宏宇(1969-),男,吉林长春人,博士,中国民航大学教授,主要研究方向为网络与系统安全基金资助:
Hongyu YANG1,2, Haihang YUAN2, Liang ZHANG3
Revised:
2022-01-11
Online:
2022-02-25
Published:
2022-02-01
Supported by:
摘要:
针对目前主机安全评估方法中无法准确计算主机安全值,忽略攻击图中主机关联性等问题,提出一种基于攻击图的主机安全评估方法。首先,生成主机攻击图,从漏洞自身、时间、环境和操作系统可利用性4个角度量化原子攻击概率并计算主机攻击概率。然后,根据专家先验评估和相关性定权法计算主机资产重要性,依据攻击图中主机间的关联关系计算主机的拓扑结构重要性。最后,依据主机漏洞影响值、主机重要性和主机攻击概率计算主机安全值。实验结果表明,所提方法得到的主机重要性和安全值符合真实网络情况,能够更全面准确地反映主机的安全状况;所提方法得到的主机安全值标准差为 0.078,大于其他方法得到的安全值标准差,表明所提方法得到的安全值离散程度更大,更易于区分安全等级和后续的风险处置优先级。
中图分类号:
杨宏宇, 袁海航, 张良. 基于攻击图的主机安全评估方法[J]. 通信学报, 2022, 43(2): 89-99.
Hongyu YANG, Haihang YUAN, Liang ZHANG. Host security assessment method based on attack graph[J]. Journal on Communications, 2022, 43(2): 89-99.
表2
各主机间的网络连通关系"
主机 | Nattack | Nhost_1 | Nhost_2 | Nhost_3 | Nhost_4 | Nhost_5 | Nhost_6 | Nhost_7 | Nhost_8 | Nhost_9 |
Nattack | — | 连通 | 连通 | 连通 | — | — | — | — | — | — |
Nhost_1 | — | — | 连通 | — | — | — | 连通 | — | — | — |
Nhost_2 | — | — | — | — | — | — | 连通 | — | — | — |
Nhost_3 | — | — | 连通 | — | 连通 | 连通 | — | — | — | — |
Nhost_4 | — | — | — | — | — | — | — | — | 连通 | — |
Nhost_5 | — | — | — | — | — | — | 连通 | — | — | — |
Nhost_6 | — | — | — | — | — | — | — | 连通 | — | — |
Nhost_7 | — | — | — | — | — | — | — | — | — | — |
Nhost_8 | — | — | — | — | — | 连通 | — | — | — | 连通 |
Nhost_9 | — | — | — | — | — | 连通 | — | — | — | — |
注:—表示未连通。 |
表3
主机漏洞信息"
主机 | 主机名称 | 漏洞CVE标识 | VE |
Nhost_1 | 管理控制主机 | CVE-2014-0226(f1) | 0.859 |
Nhost_2 | 应用服务器 | CVE-2015-1635(f2) | 1 |
Nhost_3 | 应用服务器 | CVE-2015-2578(f3) | 0.859 |
CVE-2016-3125(f4) | 1 | ||
Nhost_4 | 业务主机 | CVE-2015-0014(f5) | 1 |
Nhost_5 | 业务主机 | CVE-2007-0038(f6) | 0.859 |
Nhost_6 | 数据库服务器 | CVE-2016-0639(f7) | 1 |
CVE-2016-3471(f8) | 0.392 | ||
CVE-2016-3477(f9) | 0.314 | ||
Nhost_7 | 备份数据库服务器 | CVE-2016-3461(f10) | 0.315 |
Nhost_8 | 配置管理主机 | CVE-2006-2370(f11) | 1 |
Nhost_9 | 运行监控主机 | CVE-2003-0252(f12) | 1 |
表4
主机攻击概率"
主机 | 攻击路径 | 最大攻击概率 |
Nhost_1 | Nattack-Nhost_1 | 0.21 |
Nattack-Nhost_2 | ||
Nhost_2 | Nattack-Nhost_1-Nhost_2 | 0.49 |
Nattack-Nhost_3-Nhost_2 | ||
Nhost_3 | Nattack-Nhost_3 | 0.24 |
Nhost_4 | Nattack-Nhost_3-Nhost_4 | 0.16 |
Nattack-Nhost_3-Nhost_5 | ||
Nhost_5 | Nattack-Nhost_3-Nhost_4-Nhost_8-Nhost_5 | 0.14 |
Nattack-Nhost_3-Nhost_4-Nhost_8-Nhost_9-Nhost_5 | ||
Nattack-Nhost_1-Nhost_6 | ||
Nattack-Nhost_2-Nhost_6 | ||
Nattack-Nhost_1-Nhost_2-Nhost_6 | ||
Nhost_6 | Nattack-Nhost_3-Nhost_2-Nhost_6 | 0.1 |
Nattack-Nhost_3-Nhost_5-Nhost_6 | ||
Nattack-Nhost_3-Nhost_4-Nhost_8-Nhost_5-Nhost_6 | ||
Nattack-Nhost_3-Nhost_4-Nhost_8-Nhost_9-Nhost_5-Nhost_6 | ||
Nattack-Nhost_1-Nhost_6-Nhost_7 | ||
Nattack-Nhost_2-Nhost_6-Nhost_7 | ||
Nattack-Nhost_1-Nhost_2-Nhost_6-Nhost_7 | ||
Nhost_7 | Nattack-Nhost_3-Nhost_2-Nhost_6-Nhost_7 | 0.005 |
Nattack-Nhost_3-Nhost_5-Nhost_6-Nhost_7 | ||
Nattack-Nhost_3-Nhost_4-Nhost_8-Nhost_5-Nhost_6-Nhost_7 | ||
Nattack-Nhost_3-Nhost_4-Nhost_8-Nhost_9-Nhost_5-Nhost_6-Nhost_7 | ||
Nhost_8 | Nattack-Nhost_3-Nhost_4-Nhost_8 | 0.14 |
Nhost_9 | Nattack-Nhost_3-Nhost_4-Nhost_8-Nhost_9 | 0.11 |
表6
主机资产重要性属性权重和资产重要性"
主机 | C | I | A | 资产重要性 |
Nhost_1 | 0.309 2 | 0.326 0 | 0.364 7 | 3.04 |
Nhost_2 | 0.297 2 | 0.338 7 | 0.346 1 | 3.03 |
Nhost_3 | 0.274 3 | 0.360 6 | 0.365 1 | 3.22 |
Nhost_4 | 0.377 7 | 0.344 2 | 0.278 1 | 1.85 |
Nhost_5 | 0.287 6 | 0.366 1 | 0.346 4 | 2.33 |
Nhost_6 | 0.178 2 | 0.517 9 | 0.303 9 | 4.06 |
Nhost_7 | 0.386 6 | 0.364 6 | 0.248 8 | 4.61 |
Nhost_8 | 0.189 1 | 0.408 9 | 0.402 1 | 2.5 |
Nhost_9 | 0.308 7 | 0.380 6 | 0.310 7 | 1.67 |
[1] | 吴晨思, 谢卫强, 姬逸潇 ,等. 网络系统安全度量综述[J]. 通信学报, 2019,40(6): 14-31. |
WU C S , XIE W Q , JI Y X ,et al. Survey on network system security metrics[J]. Journal on Communications, 2019,40(6): 14-31. | |
[2] | 丁绍虎, 齐宁, 郭义伟 . 基于 M-FlipIt 博弈模型的拟态防御策略评估[J]. 通信学报, 2020,41(7): 186-194. |
DING S H , QI N , GUO Y W . Evaluation of mimic defense strategy based on M-FlipIt game model[J]. Journal on Communications, 2020,41(7): 186-194. | |
[3] | 罗智勇, 杨旭, 刘嘉辉 ,等. 基于贝叶斯攻击图的网络入侵意图分析模型[J]. 通信学报, 2020,41(9): 160-169. |
LUO Z Y , YANG X , LIU J H ,et al. Network intrusion intention analysis model based on Bayesian attack graph[J]. Journal on Communications, 2020,41(9): 160-169. | |
[4] | 席荣荣, 云晓春, 张永铮 . 基于环境属性的网络威胁态势量化评估方法[J]. 软件学报, 2015,26(7): 1638-1649. |
XI R R , YUN X C , ZHANG Y Z . Quantitative threat situational assessment based on contextual information[J]. Journal of Software, 2015,26(7): 1638-1649. | |
[5] | SHAN C , GAO J , HU C Z ,et al. Network risk assessment method based on asset correlation graph[C]// Trusted Computing and Information Security. Berlin:Springer, 2019: 65-83. |
[6] | POKHREL N R , TSOKOS C P . Cybersecurity:a stochastic predictive model to determine overall network security risk using Markovian process[J]. Journal of Information Security, 2017,8(2): 91-105. |
[7] | 李欢 . 基于贝叶斯网络攻击图的动态风险评估方法研究[D]. 秦皇岛:燕山大学, 2019. |
LI H . Research on dynamic risk assessment method based on Bayesian network attack diagram[D]. Qinhuangdao:Yanshan University, 2019. | |
[8] | HU H , ZHANG H Q , YANG Y J . Security risk situation quantification method based on threat prediction for multimedia communication network[J]. Multimedia Tools and Applications, 2018,77(16): 21693-21723. |
[9] | HU W H , ZHANG L , LIU X Y ,et al. Research on automatic generation and analysis technology of network attack graph[C]// Proceedings of 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity),IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security. Piscataway:IEEE Press, 2020: 133-139. |
[10] | WANG W R , SHI F , ZHANG M ,et al. A vulnerability risk assessment method based on heterogeneous information network[J]. IEEE Access, 2020,8: 148315-148330. |
[11] | SUN X Y , DAI J , LIU P ,et al. Using Bayesian networks for probabilistic identification of zero-day attack paths[J]. IEEE Transactions on Information Forensics and Security, 2018,13(10): 2506-2521. |
[12] | 李鑫 . 基于攻击图的网络安全评估技术研究与实现[D]. 北京:北京邮电大学, 2017. |
LI X . Research and implementation of network security assessment technology based on attack graph[D]. Beijing:Beijing University of Posts and Telecommunications, 2017. | |
[13] | RUOHONEN J . A look at the time delays in CVSS vulnerability scoring[J]. Applied Computing and Informatics, 2019,15(2): 129-135. |
[14] | FREI S , MAY M , FIEDLER U ,et al. Large-scale vulnerability analysis[C]// Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense-LSAD’06. New York:ACM Press, 2006: 131-138. |
[15] | 葛海慧 . 信息安全风险多维动态管理模型及相关评估方法研究[D]. 北京:北京邮电大学, 2015. |
GE H H . Research on the multidimensional and dynamic information security risk management model and the related assessment algorithms[D]. Beijing:Beijing University of Posts and Telecommunications, 2015. | |
[16] | WANG R Y , GAO L , SUN Q ,et al. An improved CVSS-based vulnerability scoring mechanism[C]// Proceedings of 2011 Third International Conference on Multimedia Information Networking and Security. Piscataway:IEEE Press, 2011: 352-355. |
[17] | 国家质量监督检验检疫总局,中国国家标准化管理委员会. 信息安全技术信息安全风险评估规范:GB/T 20984-2007[S]. 北京:中国标准出版社, 2007. |
General Administration of Quality Supervision,Inspection and Quarantine of the People’s Republic of China,Standardization Administration of the People’s Republic of China. Information security technology-risk assessment specification for information security:GB/T 20984-2007[S]. Beijing:Standards Press of China, 2007. | |
[18] | 周爱民, 周彩霞, 欧阳晋焱 ,等. 基于指标适度标准化的界面风格美综合评价模型[J]. 浙江大学学报(工学版), 2020,54(12): 2273-2285. |
ZHOU A M , ZHOU C X , OUYANG J Y ,et al. Model of synthetic evaluation on interface stylistic beauty based on moderately standardized of index[J]. Journal of Zhejiang University (Engineering Science), 2020,54(12): 2273-2285. |
[1] | 罗智勇, 张玉, 王青, 宋伟伟. 基于贝叶斯攻击图的SDN入侵意图识别算法的研究[J]. 通信学报, 2023, 44(4): 216-225. |
[2] | 康海燕, 龙墨澜. 基于吸收马尔可夫链攻击图的网络攻击分析方法研究[J]. 通信学报, 2023, 44(2): 122-135. |
[3] | 王文娟, 杜学绘, 单棣斌. 基于动态概率攻击图的云环境攻击场景构建方法[J]. 通信学报, 2021, 42(1): 1-17. |
[4] | 罗智勇,杨旭,刘嘉辉,许瑞. 基于贝叶斯攻击图的网络入侵意图分析模型[J]. 通信学报, 2020, 41(9): 160-169. |
[5] | 吴晨思,谢卫强,姬逸潇,杨粟,贾紫艺,赵松,张玉清. 网络系统安全度量综述[J]. 通信学报, 2019, 40(6): 14-31. |
[6] | 叶子维,郭渊博,王宸东,琚安康. 攻击图技术应用研究综述[J]. 通信学报, 2017, 38(11): 121-132. |
[7] | 胡浩,叶润国,张红旗,杨英杰,刘玉岭. 基于攻击预测的网络安全态势量化方法[J]. 通信学报, 2017, 38(10): 122-134. |
[8] | 刘威歆,郑康锋,武斌,杨义先. 基于攻击图的多源告警关联分析方法[J]. 通信学报, 2015, 36(9): 135-144. |
[9] | 赵光胜,程庆丰,孙永林. 基于随机松弛优选策略的网络脆弱性弥补算法[J]. 通信学报, 2015, 36(1): 237-245. |
[10] | 杨宏宇,于巾博,谢丽霞. 基于三维球体模型的XML通信协议安全评估方法[J]. 通信学报, 2013, 34(3): 183-191. |
[11] | 叶云,徐锡山,贾焰,齐治昌,程文聪. 基于攻击图的风险邻接矩阵研究[J]. 通信学报, 2011, 32(5): 112-120. |
[12] | 吴志军,王璐,史荣. 基于改进BP神经网络的ATM系统信息安全评估方法[J]. 通信学报, 2011, 32(2): 150-158. |
[13] | 赵凯,张怡,来犇,李晓星. 基于并行的大规模网络攻击图生成算法[J]. 通信学报, 2011, 32(11A): 125-131. |
[14] | 苘大鹏,周渊,杨武,杨永田. 用于评估网络整体安全性的攻击图生成方法[J]. 通信学报, 2009, 30(3): 1-5. |
[15] | 司加全,张冰,苘大鹏,杨武. 基于攻击图的网络安全性增强策略制定方法[J]. 通信学报, 2009, 30(2): 125-130. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|