孫雪巖 吳俊華 劉效武 張淑雯
摘要:傳統(tǒng)的網絡安全風險評估方法中,存在評估結果單一性和過分主觀依賴性等問題。為使評估結果更切合實際及解決不確定性因素難以定量評估的問題,設計一個用來衡量安全防御措施能力與節(jié)點脆弱性對攻擊結果影響的成功率算法;采用攻擊威脅嚴重度算法,通過安全漏洞評分對脆弱性進行評估。最后,提出基于熵權理論的模糊綜合評判分析方法計算系統(tǒng)整體的風險態(tài)勢值,從而更好地輔助網絡分析人員及時掌握系統(tǒng)實時風險態(tài)勢。針對該方法進行仿真實驗分析,結果表明該方法可以準確并客觀地評估網絡風險,進而避免傳統(tǒng)方法存在的主觀性和片面性,證明了該方法的合理性。
關鍵詞:網絡安全風險評估; 模糊綜合評判(FCE) ; 熵權理論
DOIDOI:10.11907/rjdk.161039
中圖分類號:TP309文獻標識碼:A文章編號:1672-7800(2016)006-0192-04
參考文獻:
[1]ELSHOUSH H T,SWMAN I M.Alert correlation in collaborative intelligent intrusion detection systems-a suvey[J].Applied Soft Computing,2011,11(7):4349-4365.
[2]CHEN X Z,ZHENG Q H,GUAN X H,et al.Quantitative hierarchical threat evaluation model for network security[J].Journal of Software,2006,17(4):885-897.
[3]CHEN FENG,LIU DEHUI,ZHANG YI,et al.A hierarchical evaluation approach for network security based on threat spread model[J].Journal of Computer Research and Development,2011,48(6):945-954.
[4]DU S,LI X,DU J,et al.An attack-and-defense game for security assessment in vehicular ad hoc networks[J].Peer-to-Peer Networking and Applications,2014,7(3): 215-228.
[5]葛海慧,肖達,陳天平,楊義先.基于動態(tài)關聯分析的網絡安全風險評估方法[J].電子與信息學,2013,35(11):2630-2636.
[6]LYU H,PENG W,WANG R,et al. A real-time network threat recognition and assessment method based on association analysis of time and apace[J].Journal of Computer Research and Development,2014,51(5):1039-1049.
[7]梁吉業(yè),錢宇華.信息系統(tǒng)中的信息粒與熵理論[J].中國科學E輯:信息科學,2008,38(12):2048-2065.
[8]FU S,LIU Z,ZHOU H,et al.A security risk analysis method for information system based on information entroy[J].Open Cybernetics& Systemics Journal,2015,9(1):23-27.
[9]M SOLEIMANI DAMANEH,M ZAREPISHEH.Shannon's entropy for combining the efficiency results of different DEAmodels:Method and application[J].Expert Systems with Applications,2009,36:5146-5150.
[10]WANG TONG.The research of electronic banking risk evaluation based on comprehensive assessment AHP-entropy[J]. International Journal of U-& E-Service,Science & Technology,2014,7(6):413-422.
[11]TSAI H Y,HUANG Y L.An analytic hierarchy process-based risk assessment method for wireless netorks[J]. Reliabity, IEEE Transactions on,2011,60(4):801-816.