期刊文献+

基于贝叶斯网络的内部威胁预测研究 被引量:4

Research of predicting insider threat based on Bayesian network
在线阅读 下载PDF
导出
摘要 在内部网络带给企业办公便利的同时,内部网络所带来的威胁也日渐突出,由于企业中内部威胁具有危害性大、难以检测等特点,内部威胁亟需解决。因此,提出了基于贝叶斯网络攻击图的内部威胁预测模型。以内部用户实际操作过程中的行为为研究对象,以内部用户攻击过程中所占有的资源状态和所进行的操作序列攻击证据为节点,构建贝叶斯网络攻击图;以网络攻击图来描述攻击者在攻击过程中的不同攻击路径和攻击状态,并且利用贝叶斯网络推理算法计算内部威胁的危险概率。在贝叶斯网络攻击图中定义了元操作、原子攻击、攻击证据等概念,量化了节点变量、节点变量取值和条件概率分布。以改进的似然加权算法为基础,使贝叶斯网络的参数计算更加简便,内部威胁的预测更加精确。最后,通过仿真实验证明了该方法建模速度快、计算过程简单、计算结果精确,在预测内部威胁时的有效性和适用性。 Internal network brings convenience for corporate office, but increasing threats are also brought into enterprises. Insider threat causes great harm to enterprises, and is difficult to detect, so it is urgently to be solved. This paper put forward a predictive model of insider threat based on Bayesian network attack graphs. It considered the behaviors in attacking process as research objects, and considered the resources and operation sequence as nodes, established Bayesian network attack graphs. It described the different attack paths and attack state in the process of attacking by Bayesian network attack graphs, and used Bayesian network inference algorithm to calculate the risk probability of insider threat. In Bayesian network attack graphs, the concepts of meta-operation, atomic attack and intrusion evidence were defined, and node variable, its value and conditional probability distribution were quantified. Based on the improved likelihood weighted algorithm, the calculation of Bayesian network parameters is easier, and the prediction of insider threat is more accurate. Ultimately, by simulation experi- ment, it is proved that the modeling speed is fast, the process of calculation is simple, the result is exact, and it is valid and applicative in predicting insider threat.
出处 《计算机应用研究》 CSCD 北大核心 2013年第9期2767-2771,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(51174263) 河南省教育厅自然科学基金资助项目(2011B520015) 河南理工大学博士基金资助项目(B2010-61) 河南省社科联基金资助项目(SKL-2012-849)
关键词 内部威胁 贝叶斯网络 网络攻击图 似然加权法 insider threat Bayesian network network attack graphs likelihood weighted algorithm
  • 相关文献

参考文献12

二级参考文献73

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2巴宏欣,赵宗贵,杨飞,董强,张涛.态势估计——概念、内容与方法[J].解放军理工大学学报(自然科学版),2004,5(6):10-16. 被引量:16
  • 3曹可劲,江汉,赵宗贵.一种基于变权理论的空中目标威胁估计方法[J].解放军理工大学学报(自然科学版),2006,7(1):32-35. 被引量:42
  • 4王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:57
  • 5Cunningham W H. Optimal Attack and Reinforcement of a Network [J] .Journal of the ACM (JACM), 1985, 32(3): 549- 561.
  • 6Kuang R B. Rule Based Security Checking[R]. Technical Report, MIT lab for Computer Science, 1994.
  • 7Swiler L P, Phillips C, Gaylor T.A Graph Based Network Vulnerability Analysis System, SAND97- 3010/1[R]. Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, 1998.
  • 8Ritchey R W, AmmannP. Using Model Checking to Analyze Network Vulnerabilities[ C]//Proceedings of the IEEE Computer Society Syraposium on Security and Privacy(S&P 2000), Oakland, California, 2000:156 - 165.
  • 9Jha S, Sheyner O, Wing J. Two Formal Analyses of Attack Graphs[ C]//Proceedings of the 15^th IEEE Computer Security Foundations Workshop (CSFW'15), Cape Breton, Nova Scotia, Canada, 2002: 49-63,.
  • 10Sheyner O, Haines J, Jha S, et al. Automated Generation and Analysis of Attack Graphs[ C]//Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P 2002), Oakland, California, 2002: 254- 265.

共引文献106

同被引文献46

引证文献4

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部