首页 | 本学科首页   官方微博 | 高级检索  
     

信任攻击建模方法
引用本文:陆秋琴,和涛,黄光球,李艳. 信任攻击建模方法[J]. 计算机工程与应用, 2012, 48(22): 129-135,160
作者姓名:陆秋琴  和涛  黄光球  李艳
作者单位:西安建筑科技大学管理学院,西安,710055
基金项目:西安建筑科技大学人才科技基金项目(No.RC1019);陕西省重点学科建设专项资金资助项目
摘    要:针对信任环境系统中存在的客观弱点和主观弱点,使用弱点利用规则和信任关系盗用规则来描述信任关系状态之间的转移过程,构建了信任攻击模型TAM。在该模型中,攻击者将客观弱点用于信任级别的提升,将主观弱点用于信任关系传递,将主、客观弱点的综合利用将导致信任关系的渗透与扩散,从而可导致攻击可达距离更大;提出了复杂度为多项式时间的TAM信任关系传递闭包生成算法,该算法可以给出当前弱点状态下的所有信任攻击路径。通过对真实弱点的建模,证明此模型可以对信任的安全性进行综合分析,生成信任攻击图、信任攻击路径等详细信息,展示攻击者和信任主体之间的交互过程,对攻击特征有更好的描述能力,帮助管理者预测所有可能的信任攻击,进而为相应的安全措施的制定提供依据。

关 键 词:信任  信任安全  信任攻击  信任关系网络  信任关系盗用

Trust attack modeling
LU Qiuqin , HE Tao , HUANG Guangqiu , LI Yan. Trust attack modeling[J]. Computer Engineering and Applications, 2012, 48(22): 129-135,160
Authors:LU Qiuqin    HE Tao    HUANG Guangqiu    LI Yan
Affiliation:School of Management,Xi’an University of Architecture & Technology,Xi’an 710055,China
Abstract:According to the characteristics that object and subject vulnerabilities exist greatly in trust environment system,the vulnerability utilizing rules and trust relation embezzling rules are used to describe the state transition process of trust relations,the Trust Attack Mode(lTAM)is proposed.In the model a trust attacker uses object vulnerabilities to escalate trust levels,uses subject vulnerabilities to transit trust relations,and uses synthetically object and subject vulnerabilities to spread and pervade trust relations,therefore a longer attack reachable distance can be reached.Furthermore,a trust relation transitive closure generation algorithm of TAM whose time complexity is polynomial time is proposed,the algorithm can give all trust attack paths based on present vulnerabilities.Through an experiment based on modeling real vulnerabilities for a system,the results show that the model can make a comprehensive analysis to trust security and produce some detailed information such as trust attack graph,trust attack paths and so on.This model has good describing ability to characteristics of trust attack and shows interaction processes among attackers and trust entities.In addition,it can help an administrator to predict possible trust attacks,and then take the corresponding safety measures.
Keywords:trust  trust security  trust attack  trust relation network  trust relation embezzling
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号