通信学报 ›› 2022, Vol. 43 ›› Issue (2): 89-99.doi: 10.11959/j.issn.1000-436x.2022030

• 学术论文 • 上一篇    下一篇

基于攻击图的主机安全评估方法

杨宏宇1,2, 袁海航2, 张良3   

  1. 1 中国民航大学安全科学与工程学院,天津 300300
    2 中国民航大学计算机科学与技术学院,天津 300300
    3 亚利桑那大学信息学院,图森AZ 85721
  • 修回日期:2022-01-11 出版日期:2022-02-25 发布日期:2022-02-01
  • 作者简介:杨宏宇(1969-),男,吉林长春人,博士,中国民航大学教授,主要研究方向为网络与系统安全
    袁海航(1997-),男,山东济宁人,中国民航大学硕士生,主要研究方向为网络与系统安全
    张良(1987-),男,天津人,博士,亚利桑那大学博士后研究员,主要研究方向为强化学习和基于深度学习的信号处理
  • 基金资助:
    国家自然科学基金资助项目(U1833107)

Host security assessment method based on attack graph

Hongyu YANG1,2, Haihang YUAN2, Liang ZHANG3   

  1. 1 College of Safety Science and Engineering, Civil Aviation University of China, Tianjin 300300, China
    2 College of Computer Science and Technology, Civil Aviation University of China, Tianjin 300300, China
    3 College of Information, University of Arizona, Tucson, AZ 85721, USA
  • Revised:2022-01-11 Online:2022-02-25 Published:2022-02-01
  • Supported by:
    The National Natural Science Foundation of China(U1833107)

摘要:

针对目前主机安全评估方法中无法准确计算主机安全值,忽略攻击图中主机关联性等问题,提出一种基于攻击图的主机安全评估方法。首先,生成主机攻击图,从漏洞自身、时间、环境和操作系统可利用性4个角度量化原子攻击概率并计算主机攻击概率。然后,根据专家先验评估和相关性定权法计算主机资产重要性,依据攻击图中主机间的关联关系计算主机的拓扑结构重要性。最后,依据主机漏洞影响值、主机重要性和主机攻击概率计算主机安全值。实验结果表明,所提方法得到的主机重要性和安全值符合真实网络情况,能够更全面准确地反映主机的安全状况;所提方法得到的主机安全值标准差为 0.078,大于其他方法得到的安全值标准差,表明所提方法得到的安全值离散程度更大,更易于区分安全等级和后续的风险处置优先级。

关键词: 主机安全, 攻击图, 原子攻击概率, 资产重要性, 拓扑结构重要性, 安全评估

Abstract:

In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the atomic attack probability and the attack probability of the host was calculated from four perspectives, such as vulnerability itself, time, environment and operational system availability.Then, the host assets importance was calculated according to expert transcendental evaluation and correlation weighting method, and the topology importance of host was calculated according to the association relationship between hosts in attack graph.Finally, the host security value was calculated according to the impact value of host vulnerability, host importance and host attack probability.The experimental results show that the importance and security value of the proposed method accord with the real network situation and can reflect the security condition of the host more completely and accurately.The standard deviation of host safety value obtained by the proposed method is 0.078, which is larger than that obtained by other methods, indicating that the safety value obtained by the proposed method is more discrete and easier to distinguish the safety level from the subsequent risk disposal priority.

Key words: host security, attack graph, atomic attack probability, asset importance, topology importance, security assessment

中图分类号: 

No Suggested Reading articles found!