首页> 外文期刊>Journal of Information Security >A Novel Attack Graph Posterior Inference Model Based on Bayesian Network
【24h】

A Novel Attack Graph Posterior Inference Model Based on Bayesian Network

机译:基于贝叶斯网络的新型攻击图后验推理模型

获取原文
           

摘要

Network attack graphs are originally used to evaluate what the worst security state is when a concerned net-work is under attack. Combined with intrusion evidence such like IDS alerts, attack graphs can be further used to perform security state posterior inference (i.e. inference based on observation experience). In this area, Bayesian network is an ideal mathematic tool, however it can not be directly applied for the following three reasons: 1) in a network attack graph, there may exist directed cycles which are never permitted in a Bayesian network, 2) there may exist temporal partial ordering relations among intrusion evidence that can-not be easily modeled in a Bayesian network, and 3) just one Bayesian network cannot be used to infer both the current and the future security state of a network. In this work, we improve an approximate Bayesian posterior inference algorithm–the likelihood-weighting algorithm to resolve the above obstacles. We give out all the pseudocodes of the algorithm and use several examples to demonstrate its benefit. Based on this, we further propose a network security assessment and enhancement method along with a small network scenario to exemplify its usage.
机译:网络攻击图最初用于评估当相关网络受到攻击时最差的安全状态。结合入侵证据(例如IDS警报),攻击图可以进一步用于执行安全状态后验推断(即基于观察经验的推断)。在这一领域,贝叶斯网络是一种理想的数学工具,但是由于以下三个原因而不能直接应用:1)在网络攻击图中,可能存在有向环,而贝叶斯网络中从未允许过,2)可能无法在贝叶斯网络中轻松建模的入侵证据之间存在时间局部排序关系,并且3)只能使用一个贝叶斯网络来推断网络的当前和未来安全状态。在这项工作中,我们改进了近似贝叶斯后验算法-似然加权算法来解决上述障碍。我们给出了该算法的所有伪代码,并使用几个示例来证明其好处。基于此,我们进一步提出了一种网络安全评估和增强方法以及一个小型网络方案,以举例说明其用法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号