Research on Security Situation Prediction of Equipment Support Information Network Based on Bayesian Network

被引:0
作者
Li, Xi [1 ]
Lu, Yu [1 ]
Liu, Sen [2 ]
机构
[1] Army Engn Univ, Informat Engn Dept, Shijiazhuang 050003, Hebei, Peoples R China
[2] 54th Res Inst CETC, Shijiazhuang 050200, Hebei, Peoples R China
来源
PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017) | 2017年
关键词
equipment support information network; situation prediction; Bayesian network; attack graph;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
According to the characteristics of equipment support information network, this paper proposes a network security situation prediction model based on attack graph and Bayesian network. This paper proposes a global attack graph generation algorithm based on the forward search algorithm, and proposes an optimization scheme to solve the attack loop problem. A method for calculating the node probability of attack graph is proposed by using Bayesian network. The experimental results show that the model can accurately predict the security situation of the equipment support information network. The calculation results are more objective and practical because of adding the equipment weight information.
引用
收藏
页码:869 / 873
页数:5
相关论文
共 17 条
  • [1] [Anonymous], 2002, P 9 ACM C COMP COMM, DOI DOI 10.1145/586110.586140
  • [2] [Anonymous], 2017, COMPUT SCI
  • [3] Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics
    Cheng, Pengsu
    Wang, Lingyu
    Jajodia, Sushil
    Singhal, Anoop
    [J]. 2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, : 31 - 40
  • [4] Qualitative and quantitative analytical techniques for network security assessment
    Clark, K
    Tyree, S
    Dawkins, J
    Hale, J
    [J]. PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 321 - 328
  • [5] Dewri R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P204
  • [6] FIRST, COMM VULN SCOR SYST
  • [7] 基于贝叶斯攻击图的动态安全风险评估模型
    高妮
    高岭
    贺毅岳
    雷艳婷
    高全力
    [J]. 四川大学学报(工程科学版), 2016, 48 (01) : 111 - 118
  • [8] Extending Attack Graph-Based Security Metrics and Aggregating Their Application
    Idika, Nwokedi
    Bhargava, Bharat
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (01) : 75 - 85
  • [9] [贾炜 JIA Wei], 2008, [通信学报, Journal on Communications], V29, P191
  • [10] Phillips C, 1999, NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, P71