基于主機(jī)安全狀態(tài)遷移模型的動態(tài)網(wǎng)絡(luò)防御有效性評估
doi: 10.11999/JEIT160513
基金項(xiàng)目:
國家863計(jì)劃項(xiàng)目(2012AA012704),鄭州市科技領(lǐng)軍人才項(xiàng)目(131PLJRC644)
Effectiveness Evaluation of Moving Network Defense Based on Host Security State Transition Model
Funds:
The National 863 Program of China (2012AA 012704), The Scientific and Technological Leading Talent Project of Zhengzhou (131PLJRC644)
-
摘要: 為了進(jìn)行動態(tài)網(wǎng)絡(luò)防御有效性評估,該文提出動態(tài)網(wǎng)絡(luò)防御環(huán)境下的主機(jī)安全狀態(tài)轉(zhuǎn)移圖生成算法,構(gòu)建了主機(jī)安全狀態(tài)遷移模型,基于狀態(tài)轉(zhuǎn)移概率給出了動態(tài)網(wǎng)絡(luò)防御有效性的定量評估方法,為動態(tài)網(wǎng)絡(luò)防御策略設(shè)計(jì)提供了有益參考。最后,通過一個典型網(wǎng)絡(luò)實(shí)例說明和驗(yàn)證了上述模型和方法的可行性和有效性。
-
關(guān)鍵詞:
- 動態(tài)網(wǎng)絡(luò)防御 /
- 主機(jī)安全狀態(tài)遷移 /
- 轉(zhuǎn)移概率 /
- 有效性評估
Abstract: To evaluate the effectiveness of moving network defense, this paper presents the host security state deduce graph construction algorithm in moving network defense environment. The host security state transition model is constructed, the quantitative effectiveness evaluation method is proposed for moving network defense based on host state transition probability, and a useful reference is provided for the design of moving network defense policy. Finally, feasibility and effectiveness of the proposed model and method are illustrated and verified in a representative network example. -
PRAKASH A and WELLMAN M P. Empirical game-theoretic analysis for moving target defense[C]. Proceedings of the Second ACM Workshop on Moving Target Defense, Denver, Colorado, USA, 2015: 57-65. ZHUANG Rui, BARDAS A G, DELOACH S A, et al. A theory of cyber attacks: a step towards analyzing MTD systems[C]. Proceedings of the Second ACM Workshop on Moving Target Defense, Denver, Colorado, USA, 2015: 11-20. GREEN M, MACFARLAND D C, SMESTAD D R, et al. Characterizing network-based moving target defenses[C]. Proceedings of the Second ACM Workshop on Moving Target Defense, Denver, Colorado, USA, 2015: 31-35. JAFARIAN J H, AL-SHAER E, and QI Duan. An effective address mutation approach for disrupting reconnaissance attacks[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(12): 2562-2577. doi: 10.1109/TIFS.2015. 2467358. EVANS D, NGUYEN-TUONG A, and KNIGHT J. Effectiveness of Moving Target Defenses[M]. New York: Moving Target Defense I: Creating Asymmetric Uncertainty for Cyber Threats, Springer, 2011: 29-48. MANADHATA P K. Game Theoretic Approaches to Attack Surface Shifting[M]. New York: Moving Target Defense II: Application of Game Theory and Adversarial Modeling, Springer, 2013: 1-13. ZHUANG Rui, ZHANG Su, DELOACH S A, et al. Simulation-based approaches to studying effectiveness of moving target network defense[C]. In National Symposium on Moving Target Research, Annapolis, MD, USA, 2012: 21-26. OKHRAVI H, RIORDAN J, and CARTER K. Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism[M]. New York: Research in Attacks, Intrusions and Defenses, Springer, 2014: 405-425. ZHUANG Rui, DELOACH S A, and OU Xinming. A model for analyzing the effect of moving target defenses on enterprise networks[C]. Procee dings of the 9th Annual Cyber and Information Security Research Conference, Tennessee, USA, 2014: 73-76. HAN Yujuan, LU Wenlian, and XU Shouhuai. Characterizing the power of moving target defense via cyber epidemic dynamics[C]. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, Raleigh, NC, USA, 2014: 23-33. CARROLL T E, CROUSE M, FULP E W, et al. Analysis of network address shuffling as a moving target defense[C]. 2014 IEEE International Conference on Communications, Sydney, Australia, 2014: 701-706. HONG J B and KIM D S. Assessing the effectiveness of moving target defenses using security models[J]. IEEE Transactions on Dependable and Secure Computing, 2015, 13(2): 163-177. doi: 10.1109/TDSC.2015.2443790. 姜偉, 方濱興, 田志宏, 等. 基于攻防博弈模型的網(wǎng)絡(luò)安全測評和最優(yōu)主動防御[J]. 計(jì)算機(jī)學(xué)報(bào), 2009, 32(4): 817-827. doi: 10.3724/SP.J.1016.2009.00817. JIANG Wei, FANG Binxing, TIAN Zhihong, et al. Evaluating network security and optimal active defense based on attack-defense game model[J]. Chinese Journal of Computers, 2009, 32(4): 817-827. doi: 10.3724/SP.J.1016. 2009.00817. VAN LEEUWEN B, STOUT W, and URIAS V. Operational cost of deploying moving target defenses defensive work factors[C]. 2015 IEEE Military Communications Conference, Tampa, FL, USA, 2015: 966-971. ZAFFARANO K, TAYLOR J, and HAMILTON S. A quantitative framework for moving target defense effectiveness evaluation[C]. Proceedings of the Second ACM Workshop on Moving Target Defense, Denver, Colorado, USA, 2015: 3-10. SHEYNER O, HAINES J, JHA S, et al. Automated generation and analysis of attack graphs[C]. Proceedings of 2002 IEEE Symposium on Security and Privacy, California, USA, 2002: 273-284. YACKOSKI J, BULLEN H, YU Xiang, et al. Applying Self-shielding Dynamics to the Network Architecture[M]. New York: Moving Target Defense II: Application of Game Theory and Adversarial Modeling, Springer, 2013: 97-115. -
計(jì)量
- 文章訪問數(shù): 1471
- HTML全文瀏覽量: 182
- PDF下載量: 575
- 被引次數(shù): 0