• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ma Chunguang, Wang Chenghong, Zhang Donghong, Li Yingtao. A Dynamic Network Risk Assessment Model Based on Attacker’s Inclination[J]. Journal of Computer Research and Development, 2015, 52(9): 2056-2068. DOI: 10.7544/issn1000-1239.2015.20140177
Citation: Ma Chunguang, Wang Chenghong, Zhang Donghong, Li Yingtao. A Dynamic Network Risk Assessment Model Based on Attacker’s Inclination[J]. Journal of Computer Research and Development, 2015, 52(9): 2056-2068. DOI: 10.7544/issn1000-1239.2015.20140177

A Dynamic Network Risk Assessment Model Based on Attacker’s Inclination

More Information
  • Published Date: August 31, 2015
  • This article proposes a new dynamic network risk analysis model based on attackers’ inclination in order to solve some problems of the traditional risk analysis method based on attack graph. Traditional attack graph based on risk assessment method relies highly on the known vulnerability database and only analyzes the atomic attacks’ attribute regardless of the relationship between attack strategies and attackers’ inclination. In our model we take both the existing vulnerabilities and unknown threatens into consideration, then evaluate the attackers pressures during different attack periods so that we quantize the attackers’ inclination dynamically under the network environment. Then, we add the attackers’ inclination factors and atomic attack attributes into graph based risk assessment model, and we create a new type of attack graph using attackers’ inclination factors. Finally we set up a dynamic risk assessment method by using Bayesian reasoning engine. We convert our static attack to the dynamic Bayesian attack graph, and use the posterior probability computed by Bayesian reasoning engine to realize the dynamic risk assessment. We establish a real-world experiment environment to simulate our dynamic risk assessment model based on attackers’ inclination and validate its function. Experimental results demonstrate the rationality of this model, and prove that this system is more suitable for real-time risk assignment under the actual network environment.
  • Related Articles

    [1]Wang Jindi, Tong Xiangrong. Agent Negotiation Model Based on Round Limit Change of Non-Sparse Trust Networks[J]. Journal of Computer Research and Development, 2019, 56(12): 2612-2622. DOI: 10.7544/issn1000-1239.2019.20190163
    [2]Fan Yanfang, Cai Ying. Collaboration Supported Mandatory Access Control Model[J]. Journal of Computer Research and Development, 2015, 52(10): 2411-2421. DOI: 10.7544/issn1000-1239.2015.20150574
    [3]Ge Xin, Zhao Hai, Zhang Jun. Degree Correlation and Its Features of Spreading on Networks[J]. Journal of Computer Research and Development, 2013, 50(4): 741-749.
    [4]Zhang Zhancheng, Wang Shitong, Fu-Lai Chung. Collaborative Classification Mechanism for Privacy-Preserving[J]. Journal of Computer Research and Development, 2011, 48(6): 1018-1028.
    [5]Tong Xiangrong, Huang Houkuan, Zhang Wei. A Case Based Agent Multi-Issue Negotiation Model[J]. Journal of Computer Research and Development, 2009, 46(9): 1508-1514.
    [6]Bian Zheng'ai, Liu Bo, and Luo Junzhou. A Cooperative-Game-Based Mobile Agent Task Collaboration Model in Network Management[J]. Journal of Computer Research and Development, 2007, 44(2): 193-200.
    [7]Tao Haijun, Wang Yadong, Guo Maozu, and Wang Hanlun. A Multi-Agent Negotiation Model Based on Acquaintance Coalition and Extended Contract Net Protocol[J]. Journal of Computer Research and Development, 2006, 43(7): 1155-1160.
    [8]Yang Pei, Gao Yang, Chen Zhaoqian. Persuasive Multi-Agent Multi-Issue Negotiation[J]. Journal of Computer Research and Development, 2006, 43(7): 1149-1154.
    [9]Gao Jian and Zhang Wei. An Accelerating Chaos Evolution Algorithm of Bilateral Multi-Issue Automated Negotiation in MAS[J]. Journal of Computer Research and Development, 2006, 43(6): 1104-1108.
    [10]Zhao Xinpei, Li Mingshu, Chan Keith, Wang Qing. A Negotiation-Based Approach for Software Process Collaboration[J]. Journal of Computer Research and Development, 2006, 43(2): 314-320.
  • Cited by

    Periodical cited type(2)

    1. 刘梦君,蒋新宇,石斯瑾,江南,吴笛. 人工智能教育融合安全警示:来自机器学习算法功能的原生风险分析. 江南大学学报(人文社会科学版). 2022(05): 89-101 .
    2. 刘波涛,彭长根,吴睿雪,丁红发,谢明明. 面向数字型的轻量级保形加密算法研究. 计算机研究与发展. 2019(07): 1488-1497 . 本站查看

    Other cited types(3)

Catalog

    Article views (1383) PDF downloads (878) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return