首页 | 本学科首页   官方微博 | 高级检索  
     

基于Markov博弈模型的网络安全态势感知方法
引用本文:张勇,谭小彬,崔孝林,奚宏生.基于Markov博弈模型的网络安全态势感知方法[J].软件学报,2011,22(3):495-508.
作者姓名:张勇  谭小彬  崔孝林  奚宏生
作者单位:中国科学技术大学自动化系,安徽合肥,230027
基金项目:国家高技术研究发展计划(863)(2006AA01Z449);中国博士后科学基金资助项目(20070420738)
摘    要:为了分析威胁传播对网络系统的影响,准确、全面地评估系统的安全性,并给出相应的加固方案,提出一种基于Markov博弈分析的网络安全态势感知方法通过对多传感器检测到的安全数据进行融合,得到资产、威胁和脆弱性的规范化数据;对每个威胁,分析其传播规律,建立相应的威胁传播网络:通过对威胁、管理员和普通用户的行为进行博弈分析,建立...

关 键 词:网络安全态势感知  威胁传播网络  Markov博弈模型
收稿时间:2009/6/24 0:00:00
修稿时间:2009/10/10 0:00:00

Network Security Situation Awareness Approach Based on Markov Game Model
ZHANG Yong,TAN Xiao-Bin,CUI Xiao-Lin and XI Hong-Sheng.Network Security Situation Awareness Approach Based on Markov Game Model[J].Journal of Software,2011,22(3):495-508.
Authors:ZHANG Yong  TAN Xiao-Bin  CUI Xiao-Lin and XI Hong-Sheng
Affiliation:Department of Automation, University of Science and Technology of China, Hefei 230027, China;Department of Automation, University of Science and Technology of China, Hefei 230027, China;Department of Automation, University of Science and Technology of China, Hefei 230027, China;Department of Automation, University of Science and Technology of China, Hefei 230027, China
Abstract:To analyze the influence of propagation on a network system and accurately evaluate system security, this paper proposes an approach to improve the awareness of network security, based on the Markov Game Model (MGM). This approach gains a standard data of assets, threats, and vulnerabilities via fusing a variety of system security data collected by multi-sensors. For every threat, it analyzes the rule of propagation and builds a threat propagation network (TPN). By using the Game Theory to analyze the behaviors of threats, administrators, and ordinary users, it establishes a three player MGM. In order to make the evaluation process a real-time operation, it optimizes the related algorithm. The MGM can dynamically evaluate system security situation and provide the best reinforcement schema for the administrator. The evaluation of a specific network indicates that the approach is suitable for a real network environment, and the evaluation result is precise and efficient. The reinforcement schema can effectively curb the propagation of threats.
Keywords:network security situation awareness  threat propagation network  Markov game model
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号