期刊文献+

基于博弈论的入侵容忍系统安全性分析模型 被引量:18

Security Analysis Model of Intrusion Tolerant Systems Based on Game Theory
下载PDF
导出
摘要 入侵容忍是一种新的网络安全方法,在其被接受能为系统提供保护之前,分析和评估它的安全性能是非常重要的。该文提出基于博弈论的入侵容忍系统安全性分析模型,将网络攻击和入侵容忍之间的过程抽象为一个2人零和随机博弈。通过对博弈双方的最优行动策略和预期收益的研究,从安全属性平均失效时间的角度分析了入侵容忍系统的可用性、机密性和完整性,同时对影响攻击者选择行动策略的因素进行了分析,得出了攻击意愿、行动收益和行动策略之间的相互关系。研究结果揭示了入侵容忍系统与攻击者之间的内在联系,为更好地防御网络攻击和入侵提供了决策依据。 Intrusion tolerance is a new mechanism used to build secure computer networks.Therefore,it’s very important to analyze and evaluate the security performance of intrusion tolerant networks before intrusion tolerance is absolutely adopted.Thus,a security analysis model of intrusion tolerant systems based on game theory is proposed in this paper.According to the analysis model,the processes between attacking and tolerating intrusions are considered as a two-player zero-sum stochastic game,in which the optimal action strategies and expected payoffs of the two parties are studied.By using the study results,this paper analyzes the availability,confidentiality and integrality of intrusion-tolerance systems from the perspective of mean time to failure.Meanwhile,it analyzes the factors that will affect the attackers’ choices about action strategies,and obtains the relationships between attack will,payoff and action strategy.The results present the underlying interconnections between intrusion tolerant systems and attackers,which will provide helpful references to withstand the network attacks and intrusions.
机构地区 西安通信学院
出处 《电子与信息学报》 EI CSCD 北大核心 2013年第8期1933-1939,共7页 Journal of Electronics & Information Technology
基金 陕西省自然科学基金(2011JQ8039)资助课题
关键词 网络安全 入侵容忍 博弈论 随机博弈 安全属性 平均失效时间 Network security Intrusion tolerance Game theory Stochastic game Security attribute Mean time to failure
  • 相关文献

参考文献6

二级参考文献66

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 4Cavusoglu H, Mishra B, Raghunathan S. The value of intrusion detection systems in IT security. Information Systems Research, 2005, 16(1): 28-46
  • 5Athanasiades N, Abler R, Levine Jet al. Intrusion detection testing and benehmarking methodologies//Proceedings of the 1st IEEE International Workshop on Information Assurance. Darmstadt, Germany: IEEE Computer Society, 2003: 63-72
  • 6Ulvila J W, Gaffney J E. A decision analysis method for evaluating computer intrusion detection systems. Decision Analysis, 2004, 1(1): 39-54
  • 7Ryu Y U, Rhee H S. Evaluation of intrusion detection systems under a resource constraint. ACM Transactions on Information and Systems Security, 2008, 11(4):20.1 -20. 24
  • 8Sabahi F, Movaghar A. Intrusion detection: A survey//Proceedings of the 3rd International Conference on Systems and Networks Communications (ICSNC' 08). Sliema, Malta, 2008:23-26
  • 9Poe James, Li Tao. BASS: A benchmark suit for evaluating architectural security systems. ACM SIGARCH Computer Architecture News, 2006, 34(4): 26-33
  • 10Cavusoglu Huseyin, Mishra Birendra, Raghunathan Srinivasan. A model for evaluating IT security investments. Communications of the ACM, 2004, 47(7): 87-91

共引文献147

同被引文献98

引证文献18

二级引证文献116

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部