基于贝叶斯网权限图的网络安全评估方法分析-analysis of network security evaluation method based on bayesian network permission map.docxVIP

  • 9
  • 0
  • 约6.9万字
  • 约 77页
  • 2018-05-18 发布于上海
  • 举报

基于贝叶斯网权限图的网络安全评估方法分析-analysis of network security evaluation method based on bayesian network permission map.docx

基于贝叶斯网权限图的网络安全评估方法分析-analysis of network security evaluation method based on bayesian network permission map

摘要计算机网络面临着无处不在的脆弱性以及可能遭受来自各方面的威胁和攻 击,安全风险是必然存在的,网络安全评估是网络安全主动防御中的一项重要技 术,对网络安全技术的研究具有重要的意义,是目前的研究热点之一。首先介绍了网络安全评估发展背景和研究现状。接着详细介绍了网络安全评 估方法。现今的网络安全评估方法大致可以分为三类,即基于量化的网络安全评 估方法、基于规则的网络安全评估方法以及基于模型的网络安全评估方法。本文 综合量化方法的贝叶斯网、模型的图论方法以及规则类的 CVSS 打分,给出了基于 贝叶斯网权限图的网络安全评估方法,该方法基于贝叶斯网权限图的网络安全评 估方法首先对目标网络进行建模,根据建模算法生成权限图,随后利用贝叶斯网 中概率学的知识对权限图进行各种量化分析,其中包括了后验概率分析、MPE 分析、 全局分析等概率学方面。文章的使用一个实例,对给出的基于贝叶斯权限图的网 络安全评估方法进行了验证,说明了系统的功能。关键词:网络安全评估贝叶斯网权限图量化分析The computer network is facing the vulnerabilities that exist everywhere, threats and attacks that come from various aspects. There is security risk inevitably. The security evaluation which is an important active defense technology in network security, has the vital significance to the network security technology research, and is one of present research focus.In this paper, we introduce the development background and present research status of network risk assessment briefly at first. Then the methods of risk assessment are introduced in detail. Network security assessment can be concluded as follows: quantitative assessment, assessment based on rules and assessment based on models. This paper works out with a method of network security assessment based on Bayesian privilege graph which is a combination of quantitative method of Bayesian network, model of graph theory and rules like CVSS. This method of network security assessment based on Bayesian privilege graph involves quantitative assessment and assessment based on model. It first generates some kind of privilege graph according to some algorithm and then it gives different kinds of quantitative analysis including posteriori probability analysis, MPE analysis, global analysis. At last we used the method of network security assessment based on Bayesian privilege graph to test an example and which has explained the method’s correctness.Keyword: Network security assessmentBayesian NetworkPrivilege graph Quantitative analysis第一章 绪论..................................................

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档