Quantitative evaluation method of network security situation based on attack graph

A technology for network security and quantitative evaluation, applied in the field of information security, can solve problems such as subjectivity, inability to overcome the acquisition of Bayesian network prior probability, and non-scalability

Active Publication Date: 2017-06-13
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most network security assessment methods are mostly qualitative assessments. The disadvantage is that researchers have different definition standards for network security, which brings uncertainty to assessment and emergency response, and the assessment results are subjective. sex
The main problems of existing quantitative evaluation research programs are: operatio...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantitative evaluation method of network security situation based on attack graph
  • Quantitative evaluation method of network security situation based on attack graph
  • Quantitative evaluation method of network security situation based on attack graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] According to the above technical solution, the technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings and implementation examples.

[0076] The network security situation assessment method based on the attack graph proposed by the present invention is used to evaluate the network security situation, and its operation process is as follows figure 1 As shown, the specific operation steps are:

[0077] Step 1: Generate an attack graph. Specifically:

[0078] Step 1.1: The network architecture diagram used in the experiment is as follows figure 2 As shown, the CVE name of the vulnerability in the network is obtained through the X-san scanning tool, and the vulnerability information is searched in the CVE-compatible database to form a list of vulnerability information, which is represented by the symbol VulExploitList, as shown in Table 1. Then, for each vulnerability in the vulnerability information li...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a quantitative evaluation method of a network security situation based on an attack graph, and belongs to the field of information security technology. The method specifically comprises the following steps: step 1, generating the attack graph; step 2, evaluating the importance of nodes in the attack graph G; step 3, on the operation basis of step 1, calculating the maximum probability that the nodes in the attack graph G are successfully permeated; and step 4, obtaining an evaluation value of the network security situation. Compared with the prior art, the method provided by the invention has the following advantages: (1) by adoption of the evaluation method based on the attack graph, the intention of multi-step attacks of an attacker using the loopholes in the network can be reflected. (2) The data used in the evaluation method are easy to collect and are operable. (3) The protection conditions of the nodes in the network obtained in the evaluation process reflect the protection conditions of the nodes in the network. (4) In the evaluation method, the topological information of the network, loophole association information and the attack intention of the attacker are comprehensively considered, and thus the precision of the evaluation result is high.

Description

technical field [0001] The invention relates to a quantitative evaluation method of a network security situation based on an attack graph, and belongs to the technical field of information security. Background technique [0002] With the rapid development of computer networks, security loopholes and hidden dangers in network information systems are also emerging one after another. The types and numbers of network attacks have doubled, and basic networks and information systems are facing severe security threats. In this context, it is of great significance to study the quantitative assessment of network security situation. [0003] In recent years, the evaluation of network security situation has gradually developed from stand-alone, local, and qualitative analysis to distributed, global, and objective analysis. At present, most network security assessment methods are mostly qualitative assessments. The disadvantage is that researchers have different definition standards fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 胡昌振郑宇坤吕坤
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products