CN106453217A - Network attack path behavior prediction method based on path revenue calculation - Google Patents
Network attack path behavior prediction method based on path revenue calculation Download PDFInfo
- Publication number
- CN106453217A CN106453217A CN201610241075.8A CN201610241075A CN106453217A CN 106453217 A CN106453217 A CN 106453217A CN 201610241075 A CN201610241075 A CN 201610241075A CN 106453217 A CN106453217 A CN 106453217A
- Authority
- CN
- China
- Prior art keywords
- node
- attack
- path
- resource
- resource node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a network attack path behavior prediction method based on path revenue calculation. The method comprises the steps of acquiring a to-be-evaluated network; acquiring all nodes in the to-be-evaluated network; calculating each ratio between revenue and cost of a path between two nodes; eliminating the paths with ratios which are smaller than one between the revenue and the cost from all the nodes, obtaining the paths after redundant path elimination as attack paths; calculating confidences of the nodes contained in the attack paths by means of a likelihood weighting algorithm; and outputting the attack paths and the confidences of the nodes contained in the attack paths. The network attack path behavior prediction method improves path prediction accuracy and can be widely applied in a network safety field.
Description
Technical field
The present invention relates to the Forecasting Methodology of network attack path behavior, particularly relate to a kind of based on path income calculation
The Forecasting Methodology of network attack path behavior.
Background technology
The attack that computer network system faces in essence, is owing to computer system itself exists leak,
And the threat of outside utilizes these leaks existing or fragility offensive attack, thus cause the generation of attack.In order to answer
To the network security problem becoming increasingly conspicuous, except designing as far as possible in addition to security system, also need the fragility of coupling system to net
Network is attacked and is effectively predicted and defend.
In recent years, researcher starts application Bayesian network and attack graph in the prediction of attack.Bayesian network
Network has the advantages that to process uncertain data, and attack graph can assess system CVSS based on tender spots, automatically identifies possible
Tender spots, and then by analyzing tender spots dependence, show all attack paths, finally play integrated estimation system and become safely
The effect of gesture.Relative to attack graph, Bayesian network node and directed edge describe attack and the cause and effect of node resource depends on
The relation of relying, describes uncertainty relation between node by confidence level, possesses the ability processing uncertainty relation.Thus, how will
Bayesian network effectively merges with attack graph, and then Forecast attack path becomes the problem needing to solve accurately.
In a word, in prior art, with increasing of target network node, the attack path of generation exponentially increases, and
Along with substantial amounts of path redundancy, and then affect the forecasting accuracy of attack path.
Content of the invention
In view of this, a kind of network attack path row based on path income calculation of offer is provided
For Forecasting Methodology, improve path prediction accuracy.
In order to achieve the above object, the technical scheme that the present invention proposes is:
A kind of Forecasting Methodology of the network attack path behavior based on path income calculation, including:Obtain network to be assessed;
Obtain all resource nodes in described network to be assessed and attack node;Intermediary resources node is connected with more than one forerunner
Attacking node and attacking node with more than one rear-guard, starting resource node is connected with more than one rear-guard and attacks node, mesh
Mark resource node is connected with more than one predecessor attack node;Wherein, resource node includes as network attack starting point
Starting resource node, save with target as being positioned at start node on the target resource node of network attack impact point, network path
Intermediary resources node between point;It according to network attack path, according to sequence of attack, is arranged on before the resource node being hacked
And the attack node being directly connected to the resource node being hacked is as predecessor attack node, is arranged on the resource node being hacked
The attack node being directly connected to below and with the resource node being hacked is as predecessor attack node;Calculate each described attack to save
Ratio between path income between point and resource node and cost;From between above-mentioned all of attack node and resource node
Path in remove the path less than 1 for the ratio between income and cost, obtain the path after removing redundant path, as attack
Path;Utilize likelihood weighting algorithm, calculate the confidence level of contained attack node and resource node on described attack path;Output institute
State the confidence level of contained attack node and resource node on attack path and described attack path.
In sum, the Forecasting Methodology based on the network attack path behavior of path income calculation of the present invention is passed through
The calculating of node belief is converted into the calculating of attack cost-income by NVAG model, and by relatively low to some weights
Resource node with attack node mark reduce redundant path.Further, the node identification for AND relation node, this
Invention is added up mode by weights, ensure not increase redundant path and do not lose may the active path of attack on the premise of,
Improve the accuracy of node belief.
Brief description
Fig. 1 is the flow chart of the Forecasting Methodology of the network attack path behavior based on path income calculation of the present invention.
Fig. 2 is network attack path NAP schematic diagram of the present invention.
Fig. 3 is the schematic diagram that the attack graph based on fragility of the present invention generates prototype.
Fig. 4 is NVAG model schematic of the present invention.
Fig. 5 is the generation process schematic of NAP of the present invention.
Fig. 6 is attack graph schematic diagram of the present invention.
Fig. 7 is NAP1 node belief of the present invention contrast schematic diagram.
Fig. 8 is NAP2 node belief of the present invention contrast schematic diagram.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, right below in conjunction with the accompanying drawings and the specific embodiments
The present invention is described in further detail.
Fig. 1 is the Forecasting Methodology of the network attack path behavior based on path income calculation of the present invention.Such as Fig. 1 institute
Showing, the present invention, based on the Forecasting Methodology of the network attack path behavior of path income calculation, comprises the steps:
Step 11, obtains network to be assessed.
Step 12, obtains all resource nodes in described network to be assessed and attack node;Intermediary resources node connects
Having more than one predecessor attack node to attack node with more than one rear-guard, starting resource node is connected with more than one
Rear-guard attacks node, and target resource node is connected with more than one predecessor attack node;Wherein, resource node includes as net
Network is attacked the starting resource node of starting point, has been positioned on the target resource node of network attack impact point, network path
Intermediary resources node between beginning node and destination node;It according to network attack path, according to sequence of attack, is arranged on and is hacked
Resource node before and the attack node that is directly connected to the resource node being hacked as predecessor attack node, be arranged on by
The attack node being directly connected to after the resource node attacked and with the resource node being hacked is as predecessor attack node.
In the present invention, network attack path NAP (Network Attack Path) is that network objectives resource is entered by assailant
When row is attacked, first starting resource node is launched a offensive, change its state, then on this basis other resource nodes are entered
Row is attacked.It is so repeated, until finally occupying the set of paths of destination node.As in figure 2 it is shown, assailant is from starting resource
Node r1Set out, need to be through attacking node a1, intermediary resources node r2, attack node a2Or through attacking node a1, intermediary resources
Node r3, expose one's past misdeeds node a2, eventually arrive at target resource node r4.Wherein, by r1、a1、r2、a2、r4The joint forming sequentially
Point sequence is a NAP.Same r1、a1、r2、a2、r4This ordered nodes is also a NAP.
Step 13, calculates the ratio between the path income between each described attack node and resource node and cost;
Remove the road less than 1 for the ratio between income and cost from the path between above-mentioned all of attack node and resource node
Footpath, obtains the path after removing redundant path, as attack path.
Step 14, utilizes likelihood weighting algorithm, calculates putting of contained attack node and resource node on described attack path
Reliability.
Step 15, exports the confidence of contained attack node and resource node on described attack path and described attack path
Degree.
In the present invention, step 11 obtains the mode of assessment network as it is shown on figure 3, first, utilize network scanner to mesh
Mark computer and network of relation are scanned, and the data obtaining related node fragility add system mode queue to;Secondly,
System extracts any bar status information automatically in the middle of state queue, and this information is carried out information pair by network knowledge security vault module
Ratio:If this information verifies as dangerous, then analyzing this information, and then determining tender spots feature, record is in tender spots list storehouse
In CVSS.The present invention combines tender spots scanning tools, accelerates the unsafe factor in the middle of discovery main frame and network, improves system true
Determine speed and the degree of accuracy of non-safety information.Tender spots feature in tender spots list storehouse in CVSS is carried out by intrusion feature database
Extract and sum up, obtain the attack signature of non-safety information, determine its harmfulness.Finally, attack graph maker is special according to attacking
Levy storehouse and generate attack graph, and export attack graph by visualization tool.
Step 13 includes:
Step 131, generates network vulnerability attack graph NVAG according to all attack nodes of described network with resource node.
Step 132, from described network vulnerability attack graph NVAG (NVAG, network vulnerability attack
Graph), in, the path attacking status indicator without false is traveled through out, as attack path.
In the present invention, NVAG=(R, A, E, Val (ri), P, C) for having having of one or more AND-OR node composition
To acyclic figure.Wherein, R={ri| i=0,1,2,3 ... N} is each resource node set, r0Represent starting resource node, rgRepresent
Target resource node;Resource node riValue is 1 or 0, especially, ri=1 expression assailant successfully occupies this resource node,
ri=0 represents unsuccessful this resource node that occupies of assailant, 1≤g≤N, and sets r0=1, g, N are integer.A={aj|j
=1,2,3 ... N}, for attacking the set of node, is the AND-OR node set of a nonempty finite, node variable ajValue is
True or false.E={e | e ∈ (R × A) ∪ (A × R) } represent all attack nodes and resource node in network attack map
Directed edge between connection.e1=<aj, ri>∈ A × R represents ajFor for occupying resource riOccur attack, when
Directed edge<aj, ri>The jth of upper generation time attacks weights ΦjWhen >=1, then directed edge;Otherwise,.e2=<riaj>∈ R × A is then contrary, represents that assailant occupies resource node riAfter again carry out attack row
For aj.WhereinFor resource node assets value set, and riBy following four
The key element tolerance being associated:Enterprise's secret (CS) leakage, personal information (PI) leakage, coverage (RI) and the wealth relating to
Produce loss (PD).Assets value computing formula is as follows:
Here, w1, w2, w3, w4It is riThe measurement factor that resource node is associated weights shared in assets value.LCS,
LPI, LRI, LPDFor reciprocity element level degree.P={p | p ∈ C1∪C2, C1For meeting attack ajSelect the bar occurring
Part probability distribution, C2For attack ajSuccessful conditional probability distribution:Work as riOccupied sometimes could meet attack ajSend out
Carded sliver part, now ajCan select to occur or do not attack, therefore p=(aj=ture | riOccupied) ∈ [0,1], p ∈ C1:If
ajSelect attack, go to occupy ri+kResource node, occupying result is success or failure, therefore p=(ajSuccess | ajOccur
Attack) ∈ [0,1], 1≤k≤N, i+k≤N and k is integer, p ∈ C2.AND relation represents all of child nodes Kid(n)Simultaneously
Meet directive property condition and just can reach father node Father(n).The all of child nodes of OR relational representation meets any one refer to
Tropism condition can reach father node.In conjunction with actual present invention definition, when the income of assailant's offensive attack is less than attack cost
When, assailant then attacks substantially without to this target.Thus, network manager can judge to attack on this basis
The attack path that the person of hitting may select, and then take effective safeguard procedures, reduce the successful probability of attack.
Step 132 includes:
Step 1321, according to the node topology order Ψ in described network vulnerability attack graph NVAG, crisp to described network
Each in weak sexual assault figure NVAG is attacked node and is traveled through with resource node.
Step 1322, it is judged that attack the directed edge between node and resource node in described network vulnerability attack graph NVAG
Direction.
Step 1323, if attacking node to resource node<aj, ri>Directed edge, then judge described oriented
Ratio Φ between the path income on limit and costj;Wherein, i is the identification number of described resource node, and j is described attack node
Identification number, ajIt is j-th attack node, riIt is i-th resource node, attack and pass through directed edge between node and resource nodeConnect, and i, j are natural number.
Step 1324, if Φj>=1, thenOtherwise, then.
Step 1325, is identified according to the attack state to described attack node for the judged result.
Step 1326, finds out and does not contains the path that false attacks status indicator, as attack path.
Wherein, the ratio between the income in described path and cost calculates according to below equation:Φj≈Gainj/Costmax;
Wherein, identification number be j attack financial value Gain when node carries out network attackj=valiλjαj;Costj maxFor maximum
Attack cost value;1≤j≤N, N are the total quantitys attacking node in network;valiIt is network attack ajTo riAssets value;λj
It is network attack ajTo riThe control authority of obtained networking component corresponding grade weights after success;αjRefer to this attack
The Land use systems of middle fragility affects coefficient to assailant's income.
Described resource node riCorresponding assets value is:vali=w1Lcs+w2LPI+w3LRI+w4LPD;Wherein, valiResource
Node riThe key element tolerance that corresponding assets value is associated by following four:Enterprise secret CS reveals, personal information PI is revealed,
Coverage RI and property loss PD relating to;w1, w2, w3, w4It is resource node riThe measurement factor being associated is in assets
Weights shared in value;LCS, LPI, LRI, LPDFor reciprocity element level degree.
Step 132 also includes:
Step 1327, to e1The directed edge that there is AND relation in set judges, calculates more than two oriented respectively
Ratio Φ between limit income and costj, it is then added, obtain ratio and ∑ Φj.Wherein, e1=<aj, ri>}∈A×R
Represent and resource node riThe all attack nodes connecting are to resource node riThe attack collection of all attacks composition initiated
Close;A={aj| j=1,2,3 ..., N} is for attacking the set of node;R={ri| i=0,1,2,3 ..., M} is resource node set,
M is the number of resource node, and M is integer.
Step 1328, if ratio and ∑ Φj>=2, then described directed edge is labeled as true;It is otherwise labeled as false.
The directed edge being labeled as false is stored attack node set G abandoned by step 1329xIn.
Step 13210, according to attack node set G abandonedx, remove redundant path.
Step 14 includes:
Step 141, extracts n sample from the attack node and resource node of described attack path;Wherein, resource node
Sample number be pRResource node R that is individual, that obtain with extractionkThe rear-guard connecting attacks node AmSample number have pAIndividual, and pR≥
pA、pR+pA<n;K, m are natural number, and k<i、m<j.
Step 142, when the attack node that sampling obtains or resource node all identify with false, then this sampling obtains
The extraction weight attacking node or resource node be 0;The resource node obtaining when sampling without false mark and is initial
During resource node, then the extraction weight of the resource node that this sampling obtains is 1.
Step 143, in sampling process, if sampling order is followed successively by the rear-guard that resource node is connected with resource node
Attack node, then attacking of the described attack path before sampling searches the resource joint obtaining with sampling node and resource node
Point RkThe all predecessor attack node A connectingm-1, and obtain the resource node R that extraction obtainskExtraction weightThe resource node R obtaining with extractionkThe rear-guard connecting attacks node AmExtraction weight ΔA=P (Am
|Rk);Wherein, P (Rk|Am-1) at predecessor node Am-1In the presence of by network attack obtain extraction obtain resource joint
Point RkProbability, P (Am|Rk) for extracting the resource node R obtainingkIn the presence of extraction obtain this rear-guard node AmGeneral
Rate;T is natural number, and t is the resource node R obtaining with samplingkThe all predecessor attack node A connectingm-1Number;
In sampling process, if sampling order is followed successively by predecessor attack node, the resource node being connected with resource node,
Then attacking of the described attack path before sampling searches the predecessor attack node A obtaining with sampling node and resource nodem-1
The all resource node R connectingk-1, and obtain the predecessor attack node A that sampling obtainsm-1Extraction weightThe predecessor attack node A obtaining with extractionm-1The resource node R connectingkExtraction weight ΔR'=
P(Rk|Am-1);Wherein, P (Am-1|Rk-1) at the predecessor attack node A obtaining with samplingm-1The all resource node R connectingk-1
In the presence of extract the predecessor attack node A obtainingm-1Probability, P (Rk|Am-1) save for the predecessor attack obtaining in extraction
Point Am-1In the presence of obtain the resource node R that obtains of extraction by network attackkProbability;V is natural number, and v for
The predecessor attack node A that sampling obtainsm-1The all resource node R connectingk-1Number.
Step 144, if sampling order is followed successively by the rear-guard attack node that resource node is connected with resource node, then obtains
Confidence level P (A | R) the ≈ Δ of contained attack node on the described attack path obtainingA/ΔR, resource node confidence level P (R |
A)=ΔR/ΔA;If sampling order is followed successively by predecessor attack node, the resource node being connected with resource node, then acquire
Described attack path on confidence level P ' (A | R) the ≈ Δ of contained attack nodeA′/ΔR', the confidence level P ' of resource node (R | A)
=ΔR′/ΔA′.
Embodiment
In the present embodiment, NVAG model is as shown in Figure 4.Assailant is with r0As start node, with r5As destination node,
Reaching destination node from start node has 3 paths.In order to clearly show that adjacent each resource node or attack relationships between nodes, this
Invention uses oriented partial ordering relation collection incompatible expression attack path, i.e. NAPi=<r0, a1>,<a1, r1>,<r1, a2>...,<an,
rn>, symbolization ∧ represents the AND relation between node.So, the present embodiment has three attack paths:
NAP1=<r0, a1∧a2>,<a1∧a2, r1>,<r1, a4>,<a4, r3>,<r3, a7>,<a7, r5>}.
NAP2=<r0, a3>,<r0, a1∧a2>,<a3, r2>,<r2∧<a1∧a2, r1>, a6>,<a6, r4>,<r4, a7>,<
a7, r5>}.
NAP3=<r0, a3><a3, r2>,<r2, a5>,<a5, r3>,<r3, a7>,<a7, r5>}.
Attack is once to utilize process to node fragility, fragility utilize rule Rule=(Pre-resource,
Vul, Post-resource).When attacking premise resource Pre-resource and meeting, can be according to fragility Vul of this node
Initiate a step in a network to attack, and after assailant successfully initiates this time to attack, it is possible to obtain corresponding attack result, obtain
Resource Post-resource after attack.
Pre-resource is to be obtained by the Land use systems of node fragility, utilizes the resource obtaining to combine node crisp
Weak property carries out attack next time, and then obtains final goal resource.And common fragility Land use systems includes:Change control parameter
MCPa, change measurement parameter MMPa, the distorting MCPr, intercept critical data information SPa, dereference server and hunt of control program
Take control authority or password GPr etc..
In actual application, can forbid that undelegated people arbitrarily changes net by the rights management of different stage as shown in table 1
Network control assembly configuration, parameter and duty, it is ensured that the safety of equipment and control target.
Table 1 control authority rank and corresponding description
Attack result Post-resource=(Authority, Gain), represents the networking component control that assailant obtains
Permission Levels and assailant successfully utilize the income that fragility obtains.
For the network attack of an attack path jth time, i.e. ajTo ri, its income is:Gainj=valiλjαj;Wherein,
1≤j≤N, valiIt is network attack ajTo riThe corresponding assets value of resource node;λjIt is successfully to carry out after jth time attacks, institute
Obtain the control authority corresponding grade weights of networking component;αjRefer to the Land use systems of fragility in this attack to attack
Person's income affect coefficient.
Gain that single successfully utilize fragility obtained is given belowjComputational methods:
First, all parameters are given with the form of grade, and carry out initial quantization.Wherein, assets value is associated
Factor, grade classification is as shown in table 2.Weights can be arranged quantify to follow following partial ordering relation:PC > MCP > RE > LCC > W >
R > N.The quantization that fragility Land use systems affects factor alpha should follow following partial ordering relation:MCPr > MCPa > MMPa > SPa >
GPr.
Secondly, judgment matrix method is used to determine that each consequence factor corresponding to resource node is shared in assets value
Weight w, selects domain expert m people, the ratio construction m's individual 4 × 4 according to the importance degree between the factor of consequence two-by-two that expert is given
Judgment matrix s two-by-two(e):,
Wherein, m=10~30;E=1,2 ..., m;seElement formulaRepresent the consequence attribute w that expert e providespRelatively
In consequence attribute wqSignificance level.According to the individual judgment matrix { s two-by-two of the m obtaining(1), s(2)..., s(m)After }, geometry is used to put down
Equal method carries out comprehensively obtaining synthetical matrix S, and the element of S isP, q=1,2,3,4.
Finally, characteristic value Sw=γ is solvedmaxMain characteristic vector w is normalized, so that it may obtain consequence attribute weight coefficient by w
Vector w '=(w1, w2, w3, w4)T.Thus obtain w1, w2, w3, w4.
Tender spots is attacked cost and is mainly determined by three factors:Attack degree of difficulty D, hidden degree H of fragility and attack
Hit the time T successfully spending.The attack cost of single tender spots can be expressed as Costj=β1D+β2H+β3T, wherein β1,, β2, β3
For the relative weight of corresponding factor, specifically can choose according to actual conditions.The present invention sets maximum attack cost Costj max, with
Select the path of high yield, and bigger probability determines redundant path;Meanwhile, the attack degree of depth can be limited, decrease insignificant
Attack path.
Before network attack is implemented, can the attack against each other income-cost of beat time point of assailant is estimated analyzing, and uses following formula to sentence
The feasibility of this sub-attack path disconnected:
Wherein, feasibility Φ is attacked in pathjIt is the ratio that assailant attacks income and intrusion scene.Only work as Φj>=1, i.e.
When assailant can obtain income more than or equal to the cost oneself paid, assailant just can carry out attack at this paths,
Final acquisition target of attack.
The present invention shows the generation process of NAP described in the inventive method as a example by Fig. 5.Attack graph according to Fig. 5, this
Attack node each in attack graph, resource node are traveled through by invention by node topology order Ψ:First, it is determined that the side of directed edge
To being whether to attack node to resource node<aj, ri>Directed edge, if then carrying out the judgement of weights, as weights Φj>=1, then;Otherwise,, and be identified this resource node for false.If, then this attack a is meanedjAbandon.
For attack graph as shown in Figure 4, traditional Bayesian inference likelihood weighting algorithm is used to calculate the confidence of node
Degree, result of calculation is shown in Table 3;Here, effective sample number 5000 is tested;C represents C1=0.5 and C2=0.8, d represent C1=0.8
And C2=0.5;P (r0)~P (r5) represents starting resource node r0, intermediary resources node r1~r4, target resource node respectively
The confidence level of r5;P ' (a1)~P ' (a7) represents the confidence level attacking node a1~a7 respectively.
Table 3 tradition Bayesian inference result
P(r0) | P‘(a1) | P’(a2) | P’(a3) | P(r1) | P(r2) | P’(a4) | P’(a5) | P’(a6) | P(r3) | P(r4) | P’(a7) | P(r5) | |
c | 1 | 0.47 | 0.45 | 0.49 | 0.14 | 0.41 | 0.07 | 0.21 | 0.03 | 0.24 | 0.02 | 0.15 | 0.13 |
d | 1 | 0.75 | 0.77 | 0.79 | 0.16 | 0.39 | 0.14 | 0.31 | 0.05 | 0.23 | 0.03 | 0.21 | 0.11 |
As a example by weighting parameter given in the attack graph shown in Fig. 6, use each resource that the method for the invention obtains
Node, the confidence level of attack node are shown in Table 4;Here, testing effective sample number is 5000.
Each node belief that table 4 the inventive method obtains
P(r0) | P‘(a1) | P’(a2) | P’(a3) | P(r1) | P(r2) | P’(a4) | P’(a5) | P’(a6) | P(r3) | P(r4) | P’(a7) | P(r5) | |
c | 1 | 0.43 | 0.47 | 0.45 | 0.13 | 0.36 | 0.05 | 0.18 | 0 | 0.19 | 0 | 0.11 | 0.09 |
d | 1 | 0.74 | 0.76 | 0.77 | 0.15 | 0.39 | 0.12 | 0.21 | 0 | 0.17 | 0 | 0.14 | 0.06 |
The contrast of data in table can be obtained each resource node, the confidence level attacking node that two kinds of methods acquire
Situation of change.For the change of observed data more intuitively, with path NAP1And NAP2As a example by, draw out node belief and become
Changing in figure difference Fig. 7, Fig. 8 as shown in Figure 7, Figure 8, abscissa all represents each resource node and attacks node, and ordinate all represents
Each resource node, the attack corresponding confidence level of node, Ta represents node belief change when traditional algorithm condition is c, and Tb is then
Representing the change of node belief when traditional algorithm condition is d, it is different c, d two kinds that Ia with Ib then illustrates the inventive method
Under the conditions of node belief change.
By Fig. 7 and 8 it can be seen that the node belief that algorithms of different obtains is different:The inventive method has confidence
Degree is the node of 0, and in conventional method, confidence level is not the node of 0.Use the target resource node that the inventive method obtains
Confidence level substantially low than the confidence level of target resource node using conventional method to obtain.This is owing to conventional method does not considers
To path redundancy problem and income-Cost Problems, all paths can be selected to carry out attacking for it so that the confidence of target resource node
Spend higher;And the inventive method solves path redundancy problem and income-Cost Problems simultaneously, assailant can select to oneself
Beneficial or the superseded attack path nonsensical to oneself so that the confidence level of target nature node is relatively low.
The present invention also has an improvement, in conjunction with in the table 4 that the weighting parameter given in the attack graph shown in Fig. 6 obtains
Data, it can be observed that, the node belief of a2 is not 0, here it is another of the present invention improves, AND node is designated
The premise of false is no longer only to calculate the weights on a limit, and is by two even more polygon weights and adds up, and then judges
Whether carry out " abandoning attacking ".
The invention have the advantages that:(1) prediction of attack and defence is always network safety filed research
Focus, attack graph combines node fragility as the effective Forecasting Methodology of one, the present invention, by definition NVAG model, enter
And the calculating of node belief is converted into the calculating of attack cost-income, by entering the node that some weights are relatively low
Line identifier, further reduces redundant path.Incorporate the reasoning algorithm of Bayesian network on this basis, utilize prior probability meter
Calculate posterior probability, further increase the accuracy of node belief.
(2), in improved likelihood weighting algorithm, for the node identification problem of AND relation node, the present invention proposes power
The cumulative mode of value solves, and i.e. will not increase redundant path, and will not let slip the active path that assailant may select.Real
Test result show the present invention work can more effective Forecast attack path and calculate node belief, and then reduce insincere
Path redundancy, provide good preventative strategies for network security management.It is to say, not only effectively reduce redundant path,
It also avoid attacking ignoring of leak of AND relation node, and then effectively increase the accuracy of path prediction.
In sum, these are only presently preferred embodiments of the present invention, be not intended to limit protection scope of the present invention.
All within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made, should be included in the present invention's
Within protection domain.
Claims (8)
1. the Forecasting Methodology based on the network attack path behavior of path income calculation, it is characterised in that include:
Obtain network to be assessed;
Obtain all resource nodes in described network to be assessed and attack node;Intermediary resources node is connected with more than one
Predecessor attack node attacks node with more than one rear-guard, and starting resource node is connected with more than one rear-guard and attacks joint
Point, target resource node is connected with more than one predecessor attack node;Wherein, resource node includes initiateing as network attack
It the starting resource node of point, on the target resource node of network attack impact point, network path, is positioned at start node and mesh
Intermediary resources node between mark node;It according to network attack path, according to sequence of attack, is arranged on the resource node being hacked
The attack node above and with the resource node being hacked being directly connected to, as predecessor attack node, is arranged on the resource being hacked
The attack node being directly connected to after node and with the resource node being hacked is as predecessor attack node;
Calculate the ratio between the path income between each described attack node and resource node and cost;From above-mentioned all of
Attack and the path between node and resource node is removed the path less than 1 for the ratio between income and cost, obtain removing superfluous
Path behind remaining path, as attack path;
Utilize likelihood weighting algorithm, calculate the confidence level of contained attack node and resource node on described attack path;
Export the confidence level of contained attack node and resource node on described attack path and described attack path.
2. method according to claim 1, it is characterised in that described calculating each described attack node and resource node it
Between path income and cost between ratio;Remove from the path between above-mentioned all of attack node and resource node and receive
The path less than 1 for the ratio between benefit and cost, obtains the path after removing redundant path, as the step bag of attack path
Include:
Generate network vulnerability attack graph NVAG according to all attack nodes of described network with resource node;
From described network vulnerability attack graph NVAG, travel through out and do not contain the path attacking status indicator false, as attack
Path.
3. method according to claim 2, it is characterised in that described from described network vulnerability attack graph NVAG, time
Going through out and not containing the path attacking status indicator false, the step as attack path includes:
According to the node topology order Ψ in described network vulnerability attack graph NVAG, to described network vulnerability attack graph NVAG
In each attack node travel through with resource node;
Judge described network vulnerability attack graph NVAG is attacked the direction of each directed edge between node and resource node;
If attacking node to resource node<aj, ri>Directed edgeThen judge the path income of described directed edge
And the ratio Φ between costj;Wherein, i is the identification number of described resource node, and j is the identification number of described attack node, ajFor
Attack node, r j-thiIt is i-th resource node, attack and pass through directed edge between node and resource nodeEven
Connect, and i, j are natural number;
If Φj>=1, thenOtherwise, then
It is identified according to the attack state to described attack node for the judged result;
Find out and do not contain the path that false attacks status indicator, as attack path.
4. method according to claim 3, it is characterised in that the path of described directed edge is benefited and the ratio between cost
For:Φj=Gainj/Costj max;Wherein, GainjCarry out financial value during network attack for the attack node that identification number is j;
Costj maxFor maximum attack cost value.
5. method according to claim 4, it is characterised in that Gainj=valiλjαjWherein, 1≤j≤N, N are in network
Attack the total quantity of node;valiIt is network attack ajTo riAssets value;λjIt is network attack ajTo riObtained after success
The control authority corresponding grade weights of networking component;αjRefer to that assailant is received by the Land use systems of fragility in this attack
Beneficial affects coefficient.
6. method according to claim 5, it is characterised in that described resource node riCorresponding assets value is:vali=
w1Lcs+w2LPI+w3LRI+w4LPD;Wherein, resource node riCorresponding assets value valiThe key element degree being associated by following four
Amount:Enterprise's secret CS leakage, the leakage of personal information PI, coverage RI and property loss PD relating to;w1, w2, w3, w4
It is resource node riThe measurement factor being associated weights shared in assets value;LCS, LPI, LRI, LPDFor reciprocity key element etc.
Stage.
7. method according to claim 2, it is characterised in that from described network vulnerability attack graph NVAG, travel through out
Not containing false and attacking the path of status indicator, the step as screening attack path also includes:
Gather e to attacking1The middle directed edge that there is AND relation judges, calculates directed edge income and the generation of more than two respectively
Ratio Φ between valencyj, it is then added, obtain ratio and ∑ Φj;
If ratio and ∑ Φj>=2, then described directed edge is labeled as true;It is otherwise labeled as false;
The directed edge being labeled as false is stored attack node set G abandonedxIn;
According to attack node set G abandonedx, remove redundant path;
Wherein, e1=<aj, ri>∈ A × R represents and resource node riThe all attack nodes connecting are to resource node riInitiate
All attacks composition attack set;A={aj| j=1,2,3 ..., N} is for attacking the set of node;R={ri| i=
0,1,2,3 ..., M} is resource node set, and M is the number of resource node, and M is integer.
8. method according to claim 7, it is characterised in that described utilize likelihood weighting algorithm, calculates described attack road
On footpath, contained attack node includes with the step of the confidence level of resource node:
N sample is extracted from the attack node and resource node of described attack path;Wherein, the sample number of resource node is pR
Resource node R that is individual, that obtain with extractionkThe rear-guard connecting attacks node AmSample number have pAIndividual, and pR≥pA、pR+pA< n;
K, m are natural number, and k < i, m < j;
When the attack node that obtains of sampling or resource node all identify with false, then the attack node that this sampling obtains or
The extraction weight of resource node is 0;When the resource node that sampling obtains identifies without false and is starting resource node,
The extraction weight of the resource node that then this sampling obtains is 1;
In sampling process, if sampling order is followed successively by the rear-guard attack node that resource node is connected with resource node, then from
The resource node R obtaining with sampling is searched in attacking of described attack path before sampling in node and resource nodekThe institute connecting
There is predecessor attack node Am-1, and obtain the resource node R that extraction obtainskExtraction weightWith take out
Obtain the resource node R arrivingkThe rear-guard connecting attacks node AmExtraction weight ΔA=P (Am|Rk);Wherein, P (Rk|Am-1) be
At predecessor node Am-1In the presence of obtain the resource node R that obtains of extraction by network attackkProbability, P (Am|Rk) be
The resource node R that extraction obtainskIn the presence of extraction obtain this rear-guard node AmProbability;T is natural number, and t is and takes out
The resource node R that sample obtainskThe all predecessor attack node A connectingm-1Number;
In sampling process, if sampling order is followed successively by predecessor attack node, the resource node being connected with resource node, then from
The predecessor attack node A obtaining with sampling is searched in attacking of described attack path before sampling in node and resource nodem-1Connect
All resource node Rk-1, and obtain the predecessor attack node A that sampling obtainsm-1Extraction weightThe predecessor attack node A obtaining with extractionm-1The resource node R connectingkExtraction weight ΔR’
=P (Rk|Am-1);Wherein, P (Am-1|Rk-1) at the predecessor attack node A obtaining with samplingm-1The all resource nodes connecting
Rk-1In the presence of extract the predecessor attack node A obtainingm-1Probability, P (Rk|Am-1) attack for the forerunner obtaining in extraction
Beat time point Am-1In the presence of obtain the resource node R that obtains of extraction by network attackkProbability;V is natural number, and v
For the predecessor attack node A obtaining with samplingm-1The all resource node R connectingk-1Number;
If sampling order is followed successively by the rear-guard attack node that resource node is connected with resource node, then acquire is described
Confidence level P (A | R) the ≈ Δ of contained attack node on attack pathA/ΔR, confidence level P (R | the A)=Δ of resource nodeR/ΔA;
If sampling order is followed successively by predecessor attack node, the resource node being connected with resource node, the then described attack acquiring
Confidence level P ' (A | R) the ≈ Δ of contained attack node on pathA′/ΔR', the confidence level P ' of resource node (R | A)=ΔR′/
ΔA′.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610241075.8A CN106453217B (en) | 2016-04-13 | 2016-04-13 | A kind of prediction technique of the network attack path behavior based on path income calculation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610241075.8A CN106453217B (en) | 2016-04-13 | 2016-04-13 | A kind of prediction technique of the network attack path behavior based on path income calculation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106453217A true CN106453217A (en) | 2017-02-22 |
CN106453217B CN106453217B (en) | 2019-10-25 |
Family
ID=58183484
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610241075.8A Expired - Fee Related CN106453217B (en) | 2016-04-13 | 2016-04-13 | A kind of prediction technique of the network attack path behavior based on path income calculation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106453217B (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107194069A (en) * | 2017-05-23 | 2017-09-22 | 浙江工业大学 | Link prediction method based on Bayesian estimation and great node benefit |
CN107528850A (en) * | 2017-09-05 | 2017-12-29 | 西北大学 | A kind of optimal prevention policies analysis system and method based on improvement ant group algorithm |
CN107767258A (en) * | 2017-09-29 | 2018-03-06 | 新华三大数据技术有限公司 | Risk of Communication determines method and device |
CN108429728A (en) * | 2017-09-05 | 2018-08-21 | 河南理工大学 | A kind of attack path prediction technique based on time gain compensation |
CN108629474A (en) * | 2017-03-24 | 2018-10-09 | 北京航天计量测试技术研究所 | Flow safety evaluation method based on attack graph model |
CN108965035A (en) * | 2018-09-13 | 2018-12-07 | 南京信息工程大学 | A kind of attack path prediction technique based on attack gain |
CN110472419A (en) * | 2019-07-18 | 2019-11-19 | 北京理工大学 | A kind of network security risk evaluation method based on loss effect |
CN110557393A (en) * | 2019-09-05 | 2019-12-10 | 腾讯科技(深圳)有限公司 | network risk assessment method and device, electronic equipment and storage medium |
CN110868376A (en) * | 2018-11-29 | 2020-03-06 | 北京安天网络安全技术有限公司 | Method and device for determining vulnerable asset sequence in network environment |
CN110868377A (en) * | 2018-12-05 | 2020-03-06 | 北京安天网络安全技术有限公司 | Method and device for generating network attack graph and electronic equipment |
CN111222159A (en) * | 2019-12-30 | 2020-06-02 | 中国电子科技集团公司第三十研究所 | Cloud platform data leakage path identification method based on graph computing technology |
CN111818055A (en) * | 2020-07-09 | 2020-10-23 | 西安电子科技大学 | Network attack path analysis method based on dynamic feedback |
CN112235283A (en) * | 2020-10-10 | 2021-01-15 | 南方电网科学研究院有限责任公司 | Vulnerability description attack graph-based network attack evaluation method for power engineering control system |
CN112804208A (en) * | 2020-12-30 | 2021-05-14 | 北京理工大学 | Network attack path prediction method based on attacker characteristic index |
CN114362990A (en) * | 2021-11-12 | 2022-04-15 | 安天科技集团股份有限公司 | Attack path determination method and device, electronic equipment and readable storage medium |
CN114710367A (en) * | 2022-06-01 | 2022-07-05 | 武汉极意网络科技有限公司 | Method and device for determining barrier cost of network flow and electronic equipment |
CN118139115A (en) * | 2024-04-12 | 2024-06-04 | 北京安信易德科技有限公司 | Longitudinal wave underwater communication method |
CN118313842A (en) * | 2024-04-08 | 2024-07-09 | 中科链安(北京)科技有限公司 | Auxiliary tracking method and system for abnormal fund flow in Ethernet |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104301318A (en) * | 2014-10-15 | 2015-01-21 | 北京国信灵通网络科技有限公司 | Network reconnection method and device used for instant messaging application |
CN104348652A (en) * | 2013-08-06 | 2015-02-11 | 南京理工大学常熟研究院有限公司 | Method and device for evaluating system security based on correlation analysis |
CN104539601A (en) * | 2014-12-19 | 2015-04-22 | 北京航空航天大学 | Reliability analysis method and system for dynamic network attack process |
CN104750929A (en) * | 2015-03-30 | 2015-07-01 | 华南理工大学 | Rail transit service efficiency invulnerability measurement method combining network point right |
-
2016
- 2016-04-13 CN CN201610241075.8A patent/CN106453217B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104348652A (en) * | 2013-08-06 | 2015-02-11 | 南京理工大学常熟研究院有限公司 | Method and device for evaluating system security based on correlation analysis |
CN104301318A (en) * | 2014-10-15 | 2015-01-21 | 北京国信灵通网络科技有限公司 | Network reconnection method and device used for instant messaging application |
CN104539601A (en) * | 2014-12-19 | 2015-04-22 | 北京航空航天大学 | Reliability analysis method and system for dynamic network attack process |
CN104750929A (en) * | 2015-03-30 | 2015-07-01 | 华南理工大学 | Rail transit service efficiency invulnerability measurement method combining network point right |
Non-Patent Citations (1)
Title |
---|
王辉等: "基于贝叶斯推理的攻击路径预测研究", 《计算机应用研究》 * |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108629474A (en) * | 2017-03-24 | 2018-10-09 | 北京航天计量测试技术研究所 | Flow safety evaluation method based on attack graph model |
CN108629474B (en) * | 2017-03-24 | 2021-11-12 | 北京航天计量测试技术研究所 | Process safety assessment method based on attack graph model |
CN107194069A (en) * | 2017-05-23 | 2017-09-22 | 浙江工业大学 | Link prediction method based on Bayesian estimation and great node benefit |
CN107528850A (en) * | 2017-09-05 | 2017-12-29 | 西北大学 | A kind of optimal prevention policies analysis system and method based on improvement ant group algorithm |
CN108429728A (en) * | 2017-09-05 | 2018-08-21 | 河南理工大学 | A kind of attack path prediction technique based on time gain compensation |
CN108429728B (en) * | 2017-09-05 | 2020-11-06 | 河南理工大学 | Attack path prediction method based on time gain compensation |
CN107767258B (en) * | 2017-09-29 | 2021-07-02 | 新华三大数据技术有限公司 | Risk propagation determination method and device |
CN107767258A (en) * | 2017-09-29 | 2018-03-06 | 新华三大数据技术有限公司 | Risk of Communication determines method and device |
CN108965035A (en) * | 2018-09-13 | 2018-12-07 | 南京信息工程大学 | A kind of attack path prediction technique based on attack gain |
CN108965035B (en) * | 2018-09-13 | 2021-06-29 | 南京信息工程大学 | Attack path prediction method based on attack gain |
CN110868376A (en) * | 2018-11-29 | 2020-03-06 | 北京安天网络安全技术有限公司 | Method and device for determining vulnerable asset sequence in network environment |
CN110868377A (en) * | 2018-12-05 | 2020-03-06 | 北京安天网络安全技术有限公司 | Method and device for generating network attack graph and electronic equipment |
CN110472419B (en) * | 2019-07-18 | 2021-04-16 | 北京理工大学 | Network security risk assessment method based on loss effect |
CN110472419A (en) * | 2019-07-18 | 2019-11-19 | 北京理工大学 | A kind of network security risk evaluation method based on loss effect |
CN110557393A (en) * | 2019-09-05 | 2019-12-10 | 腾讯科技(深圳)有限公司 | network risk assessment method and device, electronic equipment and storage medium |
CN111222159B (en) * | 2019-12-30 | 2022-07-05 | 中国电子科技集团公司第三十研究所 | Cloud platform data leakage path identification method based on graph computing technology |
CN111222159A (en) * | 2019-12-30 | 2020-06-02 | 中国电子科技集团公司第三十研究所 | Cloud platform data leakage path identification method based on graph computing technology |
CN111818055A (en) * | 2020-07-09 | 2020-10-23 | 西安电子科技大学 | Network attack path analysis method based on dynamic feedback |
CN112235283A (en) * | 2020-10-10 | 2021-01-15 | 南方电网科学研究院有限责任公司 | Vulnerability description attack graph-based network attack evaluation method for power engineering control system |
CN112235283B (en) * | 2020-10-10 | 2022-11-11 | 南方电网科学研究院有限责任公司 | Vulnerability description attack graph-based network attack evaluation method for power engineering control system |
CN112804208B (en) * | 2020-12-30 | 2021-10-22 | 北京理工大学 | Network attack path prediction method based on attacker characteristic index |
CN112804208A (en) * | 2020-12-30 | 2021-05-14 | 北京理工大学 | Network attack path prediction method based on attacker characteristic index |
CN114362990A (en) * | 2021-11-12 | 2022-04-15 | 安天科技集团股份有限公司 | Attack path determination method and device, electronic equipment and readable storage medium |
CN114362990B (en) * | 2021-11-12 | 2023-08-29 | 安天科技集团股份有限公司 | Attack path determining method and device, electronic equipment and readable storage medium |
CN114710367A (en) * | 2022-06-01 | 2022-07-05 | 武汉极意网络科技有限公司 | Method and device for determining barrier cost of network flow and electronic equipment |
CN114710367B (en) * | 2022-06-01 | 2022-08-02 | 武汉极意网络科技有限公司 | Method and device for determining barrier cost of network flow and electronic equipment |
CN118313842A (en) * | 2024-04-08 | 2024-07-09 | 中科链安(北京)科技有限公司 | Auxiliary tracking method and system for abnormal fund flow in Ethernet |
CN118139115A (en) * | 2024-04-12 | 2024-06-04 | 北京安信易德科技有限公司 | Longitudinal wave underwater communication method |
CN118139115B (en) * | 2024-04-12 | 2024-08-02 | 北京安信易德科技有限公司 | Longitudinal wave underwater communication method |
Also Published As
Publication number | Publication date |
---|---|
CN106453217B (en) | 2019-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106453217A (en) | Network attack path behavior prediction method based on path revenue calculation | |
CN109922069B (en) | Multidimensional association analysis method and system for advanced persistent threats | |
Wang et al. | Improving robustness to model inversion attacks via mutual information regularization | |
CN112348204A (en) | Safe sharing method for marine Internet of things data under edge computing framework based on federal learning and block chain technology | |
CN111835707B (en) | Malicious program identification method based on improved support vector machine | |
Fan et al. | Jointly attacking graph neural network and its explanations | |
CN112785157B (en) | Risk identification system updating method and device and risk identification method and device | |
US11977626B2 (en) | Securing machine learning models against adversarial samples through backdoor misclassification | |
Khayyambashi et al. | An approach for detecting profile cloning in online social networks | |
CN110472419A (en) | A kind of network security risk evaluation method based on loss effect | |
CN114491541B (en) | Automatic arrangement method of safe operation script based on knowledge graph path analysis | |
Laptiev et al. | Dynamic model of cyber defense diagnostics of information systems with the use of fuzzy technologies | |
CN114417427A (en) | Deep learning-oriented data sensitivity attribute desensitization system and method | |
CN111881439B (en) | Recognition model design method based on antagonism regularization | |
Li et al. | Network security situation assessment method based on Markov game model | |
CN115883261A (en) | ATT and CK-based APT attack modeling method for power system | |
Choi et al. | PIHA: Detection method using perceptual image hashing against query-based adversarial attacks | |
Liu et al. | TEAR: Exploring temporal evolution of adversarial robustness for membership inference attacks against federated learning | |
CN108243169A (en) | A kind of network security finds out method and system | |
Dondo | A vulnerability prioritization system using a fuzzy risk analysis approach | |
CN111125747B (en) | Commodity browsing privacy protection method and system for commercial website user | |
Hu et al. | VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints | |
Lai et al. | Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks | |
Alvar et al. | Membership privacy protection for image translation models via adversarial knowledge distillation | |
CN113378985A (en) | Countermeasure sample detection method and device based on layer-by-layer correlation propagation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20191025 Termination date: 20200413 |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
DD01 | Delivery of document by public notice |
Addressee: Yang Xiaobang Document name: Notice of termination of patent right |
|
DD01 | Delivery of document by public notice |