Journal on Communications ›› 2017, Vol. 38 ›› Issue (10): 122-134.doi: 10.11959/j.issn.1000-436x.2017204

• Papers • Previous Articles     Next Articles

Quantitative method for network security situation based on attack prediction

Hao HU1,2,Run-guo YE3,Hong-qi ZHANG1,2,Ying-jie YANG1,2,Yu-ling LIU4   

  1. 1 The Third Institute,PLA Information Engineering University,Zhengzhou 450001,China
    2 Henan Key Laboratory of Information Security,Zhengzhou 450001,China
    3 China Electronics Standardization Institute,Beijing 100007,China
    4 Trusted Computing and Information Assurance Laboratory,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China
  • Revised:2017-08-28 Online:2017-10-01 Published:2017-11-16
  • Supported by:
    The National High Technology Research and Development Program of China (863 Program)(2012AA012704);The National High Technology Research and Development Program of China (863 Program)(2015AA016006);The National Key Research and Development Program of China(2016YFF0204003);The Science and Technology Leading Talent Project of Zhengzhou(131PLJRC644);The Equipment Pre-Research Foundation During the 13th Five-Year Plan Period(61400020201);The CCF-Venus “Hongyan” Research Plan(2017003);The Key Lab of Information Network Security,Ministry of Public Security(C15604)

Abstract:

To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.

Key words: attack prediction, security situation, Bayesian attack graph, attack-defense, time prediction

CLC Number: 

No Suggested Reading articles found!