CN107194259A - A kind of leak severity comprehensive estimation method and system based on attack process - Google Patents

A kind of leak severity comprehensive estimation method and system based on attack process Download PDF

Info

Publication number
CN107194259A
CN107194259A CN201710243627.3A CN201710243627A CN107194259A CN 107194259 A CN107194259 A CN 107194259A CN 201710243627 A CN201710243627 A CN 201710243627A CN 107194259 A CN107194259 A CN 107194259A
Authority
CN
China
Prior art keywords
attribute
grade
attack
pitching pile
mapping relations
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710243627.3A
Other languages
Chinese (zh)
Other versions
CN107194259B (en
Inventor
金海�
邹德清
杨巨
李珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201710243627.3A priority Critical patent/CN107194259B/en
Publication of CN107194259A publication Critical patent/CN107194259A/en
Application granted granted Critical
Publication of CN107194259B publication Critical patent/CN107194259B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Abstract

The invention discloses a kind of leak severity comprehensive estimation method based on attack process and system, the realization of wherein method includes:Off-line training and online evaluation part, off-line training part includes:Mapping relations between definition pitching pile characteristic set and pitching pile attribute, and the assessment of pitching pile attribute are regular;Pitching pile attribute is gathered, the grade of pitching pile attribute is obtained using the assessment rule of pitching pile attribute, and then according to the mapping relations between pitching pile characteristic set and pitching pile attribute, obtain the grade of pitching pile characteristic set;Training obtains attribute processing model;Online evaluation part includes:For pitching pile attribute, the grade that model obtains pitching pile characteristic set is handled using attribute, the grade of monitoring characteristic set is directly obtained for monitoring attributes, carry out the leak severity that comprehensive assessment obtains attack process.The present invention carries out comprehensive assessment to the leak severity of attack process, excludes the influence of human factor, and obtained leak severity accuracy is very high.

Description

A kind of leak severity comprehensive estimation method and system based on attack process
Technical field
The invention belongs to leak research field, integrated more particularly, to a kind of leak severity based on attack process Appraisal procedure and system.
Background technology
In face of increasingly complicated computer system and miscellaneous security breaches, computer system management person needs timely Security evaluation is carried out to leak, and timely carried out repairing leak according to the order of severity of security evaluation so that To reduce loss.In order to be able to carry out objective and accurate assessment to leak, each safe business men and release mechanism are all to security breaches Menace level done and studied to a certain degree, the security breaches appraisal procedure and evaluation criteria of oneself are then proposed one after another.It is this Inconsistency also produces such situation:For same leak, the assessment result waited until using different appraisal procedures is possible to Differ.Therefore this inconsistent real hazard degree for also causing computer management person to be very difficult to make a decision leak.
To understand the inconsistency of various safety estimation systems, NIAC proposes an open universal vulnerability assessment system Unite CVSS (common vulnerability scoring system).Its main purpose is the severity for evaluating leak, It shows the order of severity of leak using the numeral between 0-10.Numerical score is higher, then represents the serious journey of this leak Degree is bigger, while for the inconsistent problem of the vulnerability assessment system before solving, it provides a kind of succinct unified leak Assessment mode, so as to be conducive to carrying out risk assessment to leak in a short time, is minimized loss.
Existing improvement CVSS assessment mode has following several:CVSS vulnerability assessments are improved based on increase additional attribute accurate True property, CVSS vulnerability assessments are predicted based on vulnerability information is announced, and CVSS assessments are improved based on other factors are considered.Based on increasing Plus the mode of additional attribute is come to improve CVSS vulnerability assessment accuracys be to propose that the extra characteristic attribute of increase is as soft in increased leak Program dependency graph of part improves the CVSS vulnerability assessment degrees of accuracy with surface-pathlength accessibility etc. is attacked.But merely just consider The structure chart of leak software, but in face of other attacks such as ROP attacks, it is possible to cause assessment result mistake occur, this The method of kind does not account for the interference of human factor, therefore there is certain subjectivity.Other method is a large amount of based on excavating The vulnerability information of announcement improves the result of CVSS vulnerability assessments, collects the leakage announced on each website on a large scale first Hole information, the information of these leaks is excavated by the algorithm of machine learning, and it is regarded into leak attribute.Pass through these attributes Go to carry out CVSS vulnerability assessments, the severity that must be springed a leak again.This method is although it is contemplated that based on objective under big data As a result assessment, it is intended to go to exclude the interference of human factor, but this method is merely able to provide the value of a prediction, it is impossible to React the true severity springed a leak.Although improving CVSS appraisal procedures for being favorably improved based on other factors are considered CVSS is assessed, but there is also many uncertain problems, such as considers economic factor, these data be all difficult obtain or It is difficult measurement to be, therefore these factors can not go to assess in evaluation process, cause vulnerability assessment inaccurate.
In summary, the scheme of existing improvement CVSS assessment mode can not all meet simultaneously vulnerability assessment accuracy and Objectivity.Most of method is all attempting to improve the accuracy of CVSS vulnerability assessments, but seldom considers to go to exclude people Interference for factor is so as to improve the objectivity of CVSS vulnerability assessments.
The content of the invention
For the disadvantages described above or Improvement requirement of prior art, the invention provides a kind of leak based on attack process is tight Severe comprehensive estimation method and system, carry out comprehensive assessment its object is to the leak severity to attack process, effectively solve The participation for human factor of having determined and cause leak severity assess it is inaccurate the problem of.
To achieve the above object, according to one aspect of the present invention, there is provided a kind of leak based on attack process is serious Comprehensive estimation method, including off-line training and online evaluation part are spent,
Off-line training part includes:
(1) define the mapping relations between pitching pile characteristic set and pitching pile attribute, and pitching pile attribute assessment rule;
(2) pitching pile attribute is gathered, the grade of pitching pile attribute is obtained using the assessment rule of pitching pile attribute, and then according to pitching pile Mapping relations between characteristic set and pitching pile attribute, obtain the grade of pitching pile characteristic set;
(3) to all pitching pile attribute repeat steps (2), training obtains attribute processing model;
Online evaluation part includes:
(T1) attribute of attack process is gathered, the attribute of attack process includes pitching pile attribute and monitoring attributes;
(T2) for pitching pile attribute, the pitching pile characteristic set grade in attack process is obtained using attribute processing model;It is right In monitoring attributes, the monitoring characteristic set grade in attack process is directly obtained by system;
(T3) grade and the grade of monitoring characteristic set to pitching pile characteristic set carries out comprehensive assessment and obtains attack process Leak severity.
Further, pitching pile characteristic set includes:Vector of attack, attack complexity, certification, privacy and integrality, institute It is availability to state monitoring characteristic set.
Further, the specific implementation of comprehensive assessment is:
P=(m × a1×a2×a3+n×(1-(1-a4)×(1-a5)×(1-a6))-k)×f
Wherein, P is the leak severity of attack process, a1Represent the grade of vector of attack, a2Expression attack complexity etc. Level, a3Represent the grade of certification, a4Represent the grade of privacy, a5Represent the grade of integrality, a6Represent the grade of availability, m For the first preset value, n is the second preset value, and k is the 3rd preset value, and f is assessment parameter.
Further, the specific implementation of step (S1) is:
(S11) mapping relations between AU attributes and AU characteristic sets are defined, AU={ Op, Sp }, wherein Op represents system Cryptogam path parameter, Sp represents the cryptogam path parameter of leak software, extracts the path of the attribute related to AU Parameter;
(S12) AU attribute evaluation rule:AU is defined as Three Estate:High, neutralization is low;
(S13) mapping relations of AV characteristic sets and AV attributes are defined:AV={ N, A, L, P }, wherein N, which are represented, remotely to be attacked Type is hit, A represents local network attack type, and L represents local attack type, and P represents physical attacks type;
(S14) AV attribute evaluation rule:AV is defined as four grades:Long-range attack grade, local network attack grade, this Grade, physical attacks grade are attacked in ground;
(S15) mapping relations of AC characteristic sets and AC attributes are defined:AC={ Sc, DSC }, it is soft that wherein Sc represents leak The configuration of part, DSC represents different dangerous systems and called;
(S16) AC attribute evaluation rule:AC is defined as Three Estate:It is high, medium and low;
(S17) mapping relations of C characteristic sets and C attributes are defined:C=t | t ∈ ({ r } ∩ (Fp1-Fp2)) or t ∈ ({ r } ∩ (Up1-Up2)) }, wherein, Fp1, Fp2, Up1 and Up2 represent the file permission of different user respectively, and it is category that r, which is represented, Contain read right in property, it is the authority having in attribute that t, which is represented,;
(S18) C attribute evaluation rule:C is defined as Three Estate:High and low, nothing;
(S19) mapping relations of I characteristic sets and I attributes are defined:C=t | t ∈ ({ w } ∩ (Fp1-Fp2)) or t ∈ ({ w } ∩ (Up1-Up2)) }, wherein, Fp1, Fp2, Up1 and Up2 represent the file permission of different user respectively, and it is category that w, which is represented, Contain write permission in property, it is the authority having in attribute that t, which is represented,;
(S20) I attribute evaluation rule:I is defined as Three Estate:High and low, nothing.
It is another aspect of this invention to provide that there is provided a kind of leak severity integrated estimation system based on attack process, Including off-line training module and online evaluation module,
Off-line training module includes:
First training module, for defining the mapping relations between pitching pile characteristic set and pitching pile attribute, and pitching pile category Property assessment rule;
Second training module, for gathering pitching pile attribute, using pitching pile attribute assessment rule obtain pitching pile attribute etc. Level, and then according to the mapping relations between pitching pile characteristic set and pitching pile attribute, obtain the grade of pitching pile characteristic set;
3rd training module, for repeating the second module to all pitching pile attributes, training obtains attribute processing mould Type;
Online evaluation module includes:
First evaluation module, the attribute for gathering attack process, the attribute of attack process includes pitching pile attribute and monitoring Attribute;
Second evaluation module, for for pitching pile attribute, the pitching pile obtained using attribute processing model in attack process to be special Levy set class;For monitoring attributes, the monitoring characteristic set grade in attack process is directly obtained by system;
3rd evaluation module, the grade for the grade to pitching pile characteristic set and monitoring characteristic set carries out comprehensive assessment Obtain the leak severity of attack process.
Further, pitching pile characteristic set includes:Vector of attack, attack complexity, certification, privacy and integrality, institute It is availability to state monitoring characteristic set.
Further, the specific implementation of comprehensive assessment is:
P=(m × a1×a2×a3+n×(1-(1-a4)×(1-a5)×(1-a6))-k)×f
Wherein, P is the leak severity of attack process, a1Represent the grade of vector of attack, a2Expression attack complexity etc. Level, a3Represent the grade of certification, a4Represent the grade of privacy, a5Represent the grade of integrality, a6Represent the grade of availability, m For the first preset value, n is the second preset value, and k is the 3rd preset value, and f is assessment parameter.
Further, the first training module includes:
AU mapping relations modules, for defining the mapping relations between AU attributes and AU characteristic sets, AU={ Op, Sp }, Wherein Op represents the cryptogam path parameter of system, and Sp represents the cryptogam path parameter of leak software, extracts and AU phases The path parameter of the attribute of pass;
AU assesses rule module, the attribute evaluation rule for AU:AU is defined as Three Estate:High, neutralization is low;
AV mapping relations modules, the mapping relations for defining AV characteristic sets and AV attributes:AV={ N, A, L, P }, its Middle N represents long-range attack type, and A represents local network attack type, and L represents local attack type, and P represents physics and attacked Hit type;
AV assesses rule module, the attribute evaluation rule for AV:AV is defined as four grades:Long-range attack grade, office Domain net attack grade, local attack grade, physical attacks grade;
AC mapping relations modules, the mapping relations for defining AC characteristic sets and AC attributes:AC={ Sc, DSC }, wherein Sc represents the configuration of leak software, and DSC represents different dangerous systems and called;
AC assesses rule module, the attribute evaluation rule for AC:AC is defined as Three Estate:It is high, medium and low;
C mapping relations modules, the mapping relations for defining C characteristic sets and C attributes:C=t | t ∈ ({ r } ∩ (Fp1- Fp2)) ort ∈ ({ r } ∩ (Up1-Up2)) }, wherein, Fp1, Fp2, Up1 and Up2 represent the file permission of different user, r respectively It is to contain read right in attribute to represent, and it is the authority having in attribute that t, which is represented,;
C assesses rule module, the attribute evaluation rule for C:C is defined as Three Estate:High and low, nothing;
I mapping relations modules, the mapping relations for defining I characteristic sets and I attributes:C=t | t ∈ ({ w } ∩ (Fp1- Fp2)) or t ∈ ({ w } ∩ (Up1-Up2)) }, wherein, Fp1, Fp2, Up1 and Up2 represent the file permission of different user respectively, It is to contain write permission in attribute that w, which is represented, and it is the authority having in attribute that t, which is represented,;
I assesses rule module, the attribute evaluation rule for I:I is defined as Three Estate:High and low, nothing.
In general, by the contemplated above technical scheme of the present invention compared with prior art, it can obtain down and show Beneficial effect:Training attribute processing model, then in attack process, gathers the attribute of attack process first, for pitching pile attribute, The grade that model obtains pitching pile characteristic set is handled using attribute, obtains monitoring characteristic set for monitoring attributes automatic decision Grade, it is tight to the grade of pitching pile characteristic set and the leak that the grade progress comprehensive assessment of monitoring characteristic set obtains attack process Severe, whole process all without artificial participation, excludes the influence of human factor, resulting leak severity accuracy is very It is high.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the leak severity comprehensive estimation method based on attack process;
Fig. 2 is the flow chart of online evaluation part.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.As long as in addition, technical characteristic involved in each embodiment of invention described below Not constituting conflict each other can just be mutually combined.
As shown in figure 1, a kind of leak severity comprehensive estimation method based on attack process, including off-line training and online Evaluation part,
Wherein, off-line training part includes:
(1) mapping relations between defined feature set and attribute, and the assessment of attribute are regular, set up attribute model; Including:
(1-1) extracts the feature of attack and the influence to system or software by the description of CVSS models Feature, and these common characteristics are entered into row set division, these characteristic sets mainly include:Vector of attack (AV), attack is complicated Spend (AC), certification (AU), privacy (C), integrality (I), availability (A).Wherein vector of attack (AV), attacks complexity (AC) what, certification (AU), privacy (C) and integrality (I) reflected is the pitching pile characteristic set of attack, and availability (A) is anti- What is reflected is the monitoring characteristic set to system or software.Attacked in addition, being divided using set primarily to more obviously characterizing Hit the feature of behavior;
Mapping relations between the set of (1-2) defined feature and attribute, each characteristic set reflects the one of leak Individual feature, if attribute is related to characteristic set, this attribute can for react leak feature, attribute here is all It is that the system that can capture correlation from attacker or system in attack process is called;
The assessment rule of (1-3) defined attribute, in order to more intuitively show that attribute reflects each spy springed a leak The order of severity levied, we define herein attribute assessment rule, using attribute evaluation rule attribute is estimated into And the grade of characteristic set is obtained, the grade of general features set is divided into Three Estate:Height, in, it is low.
(2) pitching pile attribute is gathered, the grade of pitching pile attribute is obtained using the assessment rule of pitching pile attribute, and then according to pitching pile Mapping relations between characteristic set and pitching pile attribute, obtain the grade of pitching pile characteristic set;
Specifically, defining the mapping relations of AU characteristic sets and AU attributes:AU={ Op, Sp }, wherein Op represents system Cryptogam path parameter, Sp represents the cryptogam path parameter of leak software, Op mainly reflect attacker in order to Can authentication operation system and attempt to access system password file, Sp reflects attacker and carried out for certification leak software The cryptogam of leak software is accessed, the attribute related to AU has here:write、read、open、chown、fchown.Extract The path parameter of the attribute related to AU, when the path parameter of the attribute related to AU belongs to Op or Sp, then the feature of the attribute Collection is combined into AU.
AU attribute evaluation rule:AU is defined as Three Estate:High, neutralization is low.Our major concerns is to recognize herein The number of times of card.In the case that the path parameter extracted in the attribute of capture belongs to Op or Sp, if certification number of times is more than or equal to 2, then AU grade is height;If during certification number of times is for 1, AU grade;If certification number of times is for 0, AU grade It is low.
Define the mapping relations of AV characteristic sets and AV attributes:AV={ N, A, L, P }, wherein N represent long-range attack class Type, A represents local network attack type, and L represents local attack type, and P represents physical attacks type.These four modes point The type feature of attack pattern is not reflected, and the attribute related to AV has here:Socket, connect, accept, hub_ port_connect_change and usb_probe_interface.The attribute status related to AV is extracted, by these Attribute status carrys out the feature of distinguishing attack mode.
AV attribute evaluation rule:AV is defined as four grades:Long-range attack grade, local network attack grade, is locally attacked Hit grade, physical attacks grade.If judging attribute connect successes, illustrate that attack can be long-range attack therefore sentence Break as long-range attack type.If connect states are unsuccessful, while judging the host address and local host in server Whether address belongs to the same network segment, then illustrates it is local network attack grade if belonging to the same network segment, otherwise just It is to belong to local attack grade.If it is significant to note that capturing hub_port_conneet_change and usb_ Probe_interface is then to belong to physical attacks grade.
Define the mapping relations of AC characteristic sets and AC attributes:AC={ Sc, DSC }, wherein Sc represent leak software Configuration, DSC represents different dangerous systems and called.Whether Sc key reactions attacker attempts to change matching somebody with somebody for leak software File is put, so as to indirectly react the complexity of attack.It is different that DSC is mainly how many of calculating result in attack process The number called of dangerous system.Reflect the complexity of attack by the judgement of these numbers.Here the category related to AC Property has:Setregid, umount, mkdir, umount2, ioctl, dup, dup2,
Lock, kill, iopl, clone, modifyldtadjtimex, socketcall,
Open, link, symlink, setresuid, setreuid, setuid, fork,
Setfsuid, setgroups, setgid, setfsgid, setfsgid,
Setresgid, chmod.Here the attribute related generally to is that dangerous system is called, and is listed by counting above-mentioned Attribute obtain DSC value.
AC attribute evaluation rule:AC is defined as Three Estate:It is high, medium and low.If the parameter extracted from above-mentioned attribute Path is identical with Sc, then during grade is determined as, is otherwise determined as low.The grade if DSC number is more than 5 and is less than 10 simultaneously In being determined as.If DSC number is more than 10, it is determined as height.If DSC number is less than 5, it is determined as low.
Define the mapping relations of C characteristic sets and C attributes:C=t | t ∈ ({ r } ∩ (Fp1-Fp2)) or t ∈ ({ r } ∩ (Up1-Up2)) }, wherein, Fp1, Fp2, Up1 and Up2 represent the file permission of different user respectively, and r, which is represented, to be contained in attribute There is a read right, it is the authority having in attribute that t, which is represented,.This formula is indicated:One user does not have this file in itself Read right, but he obtains the read right of this file by certain mode or method, so as to result in privacy Destruction.Here the attribute related to C has:
Chmod, fchmodchown, fchown, lchown, setresuid, setreuid, setuid, setfsuid, this The attribute of important file path is also related to outside:/ bin ,/boot ,/dev ,/etc ,/lib ,/proc ,/root ,/srv ,/ sys。
C attribute evaluation rule:C is defined as Three Estate:High and low, nothing.If the parameter road extracted from above-mentioned attribute Footpath is identical with above-mentioned path file attribute, then grade is determined as height.If be related to alternative document be then determined as it is low.If The reading attribute for not changing correlation is then determined as nothing.
Define the mapping relations of I characteristic sets and I attributes:C=t | t ∈ ({ w } ∩ (F p1-Fp2)) or t ∈ ({ w } ∩ (Up1-Up2)) }, wherein, Fp1, Fp2, Up1 and Up2 represent the file permission of different user respectively, and w, which is represented, to be contained in attribute There is a write permission, it is the authority having in attribute that t, which is represented,.This formula is indicated:One user does not have this file in itself Write permission, but he obtains the write permission of this file by certain mode or method, so as to result in the complete of file The destruction of whole property.Here the attribute related to I has:
Chmod, fchmodchown, fchown, lchown, setresuid, setreuid, setuid, setfsuid, this The attribute of important file path is also related to outside:/ bin ,/boot ,/dev ,/etc ,/lib ,/proc ,/root ,/srv ,/ sys。
I attribute evaluation rule:I is defined as Three Estate:High and low, nothing.If the parameter road extracted from above-mentioned attribute Footpath is identical with above-mentioned path file attribute, then grade is determined as height.If be related to alternative document be then determined as it is low.If That does not change correlation writes attribute, then is determined as nothing.
Define the mapping relations of A characteristic sets and A attributes:A={ Nu, Mu, Du, Cu }, wherein Nu represent network utilization Rate, Mu represents the utilization rate of internal memory, and Du represents disk utilization, and Cu represents CPU utilization rate.We are mainly from this Four aspects investigate the influence of the availability to characteristic set A.Be worth one says be at present we can by correlation be System calls the related data for this four aspects for directly removing to obtain main frame or server, therefore we are not necessarily to further Go enumerate correlation attribute.
A attribute evaluation rule:I is defined as Three Estate:It is high and low, nothing.If any one utilization of Nu, Mu, Du, Cu Rate has exceeded 80% during attack, then grade is determined as height.If any one utilization rate of Nu, Mu, Du, Cu is in attack During exceeded 40%, then grade is determined as low.If any one utilization rate of Nu, Mu, Du, Cu is during attack Not less than 40%, then it is determined as nothing.
(3) to all pitching pile attribute repeat steps (2), training obtains attribute processing model;
The online evaluation part includes:
(T1) attribute of attack process is gathered, the attribute of attack process includes pitching pile attribute and monitoring attributes;
(T2) for pitching pile attribute, the pitching pile characteristic set grade in attack process is obtained using attribute processing model;It is right In monitoring attributes, the monitoring characteristic set grade during hitting is directly obtained by system;
(T3) grade and the grade of monitoring characteristic set to pitching pile characteristic set carries out comprehensive assessment and obtains attack process Leak severity.
Further, the specific implementation of comprehensive assessment is:
P=(m × a1×a2×a3+n×(1-(1-a4)×(1-a5)×(1-a6))-k)×f
Wherein, P is the leak severity of attack process, a1Represent the grade of vector of attack, a2Expression attack complexity etc. Level, a3Represent the grade of certification, a4Represent the grade of privacy, a5Represent the grade of integrality, a6Represent the grade of availability, m For the first preset value, n is the second preset value, and k is the 3rd preset value, and f is assessment parameter.
It is preferred that, m=8, n=6.246, k=1.5, as 1- (1-a4)×(1-a5)×(1-a6During)=0, f takes 0, works as 1- (1-a4)×(1-a5)×(1-a6) when being not equal to 0, f takes 1.176.
As shown in Fig. 2 online evaluation part includes:
(1) attribute of attack process, including pitching pile attribute and monitoring attributes are gathered;
(2) characteristic set of attack is estimated using pitching pile attribute, wherein the pitching pile feature set of attack Conjunction includes:Vector of attack (AV), attack complexity (AC), certification (AU), private (C) and integrality (I), are dependence first Processing model in call corresponding processing attribute method, to vector of attack (AV), attack complexity (AC), certification (AU) attribute After Treatment Analysis, vector of attack (AV), attack complexity (AC), the interim grade of certification (AU) and attribute are obtained, is compared The interim grade of the characteristic set of attack is obtained using processing attribute method each time, higher ranked attack is preserved Characteristic set interim grade and attribute, when all properties have all been handled, obtain the feature set of higher ranked attack The interim grade closed is the characteristic set grade of attack, is saved it in results set Result, while also from slotting The attribute that modification file permission is picked out in stake attribute is used as the input of next step;
(3) attribute for obtaining attribute and modification file permission using monitoring is estimated to effect characteristicses set, and monitoring is special Collection, which is closed, to be included being availability (A), wherein the attribute progress attribute Treatment Analysis to the modification file permission in step (2) is obtained Private (C) and integrality (I) grade, the grade of availability (A) directly can be read from monitoring attributes, and these results are all divided It is other to be stored in results set Result;
(4) to vector of attack (AV), attack complexity (AC), certification (AU), private (C), integrality (I) and availability (A) grade carries out comprehensive assessment and obtains the leak severity of attack process, and its result is stored in into results set Result In;
(5) two parts content is finally obtained:One be each characteristic set grade, characteristic set includes:Vector of attack (AV), attack complexity (AC), certification (AU), private (C), integrality (I) and availability (A), another is attack process Leak severity.
As it will be easily appreciated by one skilled in the art that the foregoing is merely illustrative of the preferred embodiments of the present invention, it is not used to The limitation present invention, any modifications, equivalent substitutions and improvements made within the spirit and principles of the invention etc., it all should include Within protection scope of the present invention.

Claims (8)

1. the leak severity comprehensive estimation method of a kind of attack process, it is characterised in that including off-line training and online evaluation Part,
The off-line training part includes:
(S1) define the mapping relations between pitching pile attribute and pitching pile characteristic set, and pitching pile attribute assessment rule;
(S2) pitching pile attribute is gathered, the grade of pitching pile attribute is obtained using the assessment rule of pitching pile attribute, and then belong to according to pitching pile Mapping relations between property and pitching pile characteristic set, obtain the grade of pitching pile characteristic set;
(S3) to all pitching pile attribute repeat steps (S2), training obtains attribute processing model;
The online evaluation part includes:
(T1) attribute of attack process is gathered, the attribute of attack process includes pitching pile attribute and monitoring attributes;
(T2) for pitching pile attribute, the pitching pile characteristic set grade in attack process is obtained using attribute processing model;For prison Attribute is controlled, the monitoring characteristic set grade in attack process is directly obtained by system;
(T3) grade and the grade of monitoring characteristic set to pitching pile characteristic set carries out the leakage that comprehensive assessment obtains attack process Hole severity.
2. a kind of leak severity comprehensive estimation method based on attack process as claimed in claim 1, it is characterised in that institute Stating pitching pile characteristic set includes:Vector of attack (AV), attack complexity (AC), certification (AU), private (C) and integrality (I), The monitoring characteristic set is availability (A).
3. a kind of leak severity comprehensive estimation method based on attack process as claimed in claim 2, it is characterised in that institute The specific implementation for stating comprehensive assessment is:
P=(m × a1×a2×a3+n×(1-(1-a4)×(1-a5)×(1-a6))-k)×f
Wherein, P is the leak severity of attack process, a1Represent the grade of vector of attack, a2The grade of attack complexity is represented, a3Represent the grade of certification, a4Represent the grade of privacy, a5Represent the grade of integrality, a6The grade of availability is represented, m is First preset value, n is the second preset value, and k is the 3rd preset value, and f is assessment parameter.
4. a kind of leak severity comprehensive estimation method based on attack process as claimed in claim 2, it is characterised in that institute The specific implementation for stating step (S1) is:
(S11) mapping relations between AU attributes and AU characteristic sets are defined, AU={ Op, Sp }, wherein Op represents the close of system Code file path parameter, Sp represents the cryptogam path parameter of leak software, extracts the path parameter of the attribute related to AU;
(S12) AU attribute evaluation rule:AU is defined as Three Estate:High, neutralization is low;
(S13) mapping relations of AV characteristic sets and AV attributes are defined:AV={ N, A, L, P }, wherein N represent long-range attack class Type, A represents local network attack type, and L represents local attack type, and P represents physical attacks type;
(S14) AV attribute evaluation rule:AV is defined as four grades:Long-range attack grade, local network attack grade, is locally attacked Hit grade, physical attacks grade;
(S15) mapping relations of AC characteristic sets and AC attributes are defined:AC={ Sc, DSC }, wherein Sc represent leak software Configuration, DSC represents different dangerous systems and called;
(S16) AC attribute evaluation rule:AC is defined as Three Estate:It is high, medium and low;
(S17) mapping relations of C characteristic sets and C attributes are defined:C=t | t ∈ ({ r } ∩ (Fp1-F p2)) ort ∈ ({ r } ∩ (Up1-Up2)) }, wherein, Fp1, Fp2, Up1 and Up2 represent the file permission of different user respectively, and r, which is represented, to be contained in attribute There is a read right, it is the authority having in attribute that t, which is represented,;
(S18) C attribute evaluation rule:C is defined as Three Estate:High and low, nothing;
(S19) mapping relations of I characteristic sets and I attributes are defined:C=t | t ∈ ({ w } ∩ (Fp1-Fp2)) ort ∈ ({ w } ∩ (Up1-Up2)) }, wherein, Fp1, Fp2, Up1 and Up2 represent the file permission of different user respectively, and w, which is represented, to be contained in attribute There is a write permission, it is the authority having in attribute that t, which is represented,;
(S20) I attribute evaluation rule:I is defined as Three Estate:High and low, nothing.
5. a kind of leak severity integrated estimation system based on attack process, it is characterised in that including off-line training module and Online evaluation module,
The off-line training module includes:
First training module, for defining the mapping relations between pitching pile characteristic set and pitching pile attribute, and pitching pile attribute Assess rule;
Second training module, for gathering pitching pile attribute, obtains the grade of pitching pile attribute using the assessment rule of pitching pile attribute, enters And according to the mapping relations between pitching pile characteristic set and pitching pile attribute, obtain the grade of pitching pile characteristic set;
3rd training module, for repeating the second module to all pitching pile attributes, training obtains attribute processing model;
The online evaluation module includes:
First evaluation module, the attribute for gathering attack process, the attribute of attack process includes pitching pile attribute and monitoring attributes;
Second evaluation module, for for pitching pile attribute, the pitching pile feature set in attack process to be obtained using attribute processing model Close grade;For monitoring attributes, the monitoring characteristic set grade in attack process is directly obtained by system;
3rd evaluation module, the grade for the grade to pitching pile characteristic set and monitoring characteristic set carries out comprehensive assessment and obtained The leak severity of attack process.
6. a kind of leak severity integrated estimation system based on attack process as claimed in claim 5, it is characterised in that institute Stating pitching pile characteristic set includes:Vector of attack (AV), attack complexity (AC), certification (AU), private (C) and integrality (I), The monitoring characteristic set is availability (A).
7. a kind of leak severity integrated estimation system based on attack process as claimed in claim 6, it is characterised in that institute The specific implementation for stating comprehensive assessment is:
P=(m × a1×a2×a3+n×(1-(1-a4)×(1-a5)×(1-a6))-k)×f
Wherein, P is the leak severity of attack process, a1Represent the grade of vector of attack, a2The grade of attack complexity is represented, a3Represent the grade of certification, a4Represent the grade of privacy, a5Represent the grade of integrality, a6The grade of availability is represented, m is First preset value, n is the second preset value, and k is the 3rd preset value, and f is assessment parameter.
8. a kind of leak severity integrated estimation system based on attack process as claimed in claim 6, it is characterised in that institute Stating the first training module includes:
AU mapping relations modules, for defining the mapping relations between AU attributes and AU characteristic sets, AU={ Op, Sp }, wherein Op represents the cryptogam path parameter of system, and Sp represents the cryptogam path parameter of leak software, extracts related to AU The path parameter of attribute;
AU assesses rule module, the attribute evaluation rule for AU:AU is defined as Three Estate:High, neutralization is low;
AV mapping relations modules, the mapping relations for defining AV characteristic sets and AV attributes:AV={ N, A, L, P }, wherein N generations Table long-range attack type, A represents local network attack type, and L represents local attack type, P represents physical attacks class Type;
AV assesses rule module, the attribute evaluation rule for AV:AV is defined as four grades:Long-range attack grade, LAN Attack grade, local attack grade, physical attacks grade;
AC mapping relations modules, the mapping relations for defining AC characteristic sets and AC attributes:AC={ Sc, DSC }, wherein Sc generations The table configuration of leak software, DSC represents different dangerous systems and called;
AC assesses rule module, the attribute evaluation rule for AC:AC is defined as Three Estate:It is high, medium and low;
C mapping relations modules, the mapping relations for defining C characteristic sets and C attributes:C=t | t ∈ ({ r } ∩ (F p1-F P2)) or t ∈ ({ r } ∩ (Up1-Up2)) }, wherein, Fp1, Fp2, Up1 and Up2 represent the file permission of different user, r respectively It is to contain read right in attribute to represent, and it is the authority having in attribute that t, which is represented,;
C assesses rule module, the attribute evaluation rule for C:C is defined as Three Estate:High and low, nothing;
I mapping relations modules, the mapping relations for defining I characteristic sets and I attributes:C=t | t ∈ ({ w } ∩ (Fp1- Fp2)) ort ∈ ({ w } ∩ (Up1-Up2)) }, wherein, Fp1, Fp2, Up1 and Up2 represent the file permission of different user, w respectively It is to contain write permission in attribute to represent, and it is the authority having in attribute that t, which is represented,;
I assesses rule module, the attribute evaluation rule for I:I is defined as Three Estate:High and low, nothing.
CN201710243627.3A 2017-04-14 2017-04-14 A kind of loophole severity comprehensive estimation method and system based on attack process Active CN107194259B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710243627.3A CN107194259B (en) 2017-04-14 2017-04-14 A kind of loophole severity comprehensive estimation method and system based on attack process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710243627.3A CN107194259B (en) 2017-04-14 2017-04-14 A kind of loophole severity comprehensive estimation method and system based on attack process

Publications (2)

Publication Number Publication Date
CN107194259A true CN107194259A (en) 2017-09-22
CN107194259B CN107194259B (en) 2019-06-28

Family

ID=59870920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710243627.3A Active CN107194259B (en) 2017-04-14 2017-04-14 A kind of loophole severity comprehensive estimation method and system based on attack process

Country Status (1)

Country Link
CN (1) CN107194259B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110808947A (en) * 2019-05-23 2020-02-18 南瑞集团有限公司 Automatic vulnerability quantitative evaluation method and system
CN110831306A (en) * 2019-12-13 2020-02-21 杭州罗莱迪思照明系统有限公司 Intelligent lighting system and safety design method thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101950338A (en) * 2010-09-14 2011-01-19 中国科学院研究生院 Bug repair method based on hierarchical bug threat assessment
CN102799822A (en) * 2012-07-11 2012-11-28 中国信息安全测评中心 Software running security measurement and estimation method based on network environment
CN103984900A (en) * 2014-05-19 2014-08-13 南京赛宁信息技术有限公司 Android application vulnerability detection method and Android application vulnerability detection system
CN104933362A (en) * 2015-06-15 2015-09-23 福州大学 Automatic detection method of API (Application Program Interface) misuse-type bug of Android application software
CN105427172A (en) * 2015-12-04 2016-03-23 北京华热科技发展有限公司 Risk assessment method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101950338A (en) * 2010-09-14 2011-01-19 中国科学院研究生院 Bug repair method based on hierarchical bug threat assessment
CN102799822A (en) * 2012-07-11 2012-11-28 中国信息安全测评中心 Software running security measurement and estimation method based on network environment
CN103984900A (en) * 2014-05-19 2014-08-13 南京赛宁信息技术有限公司 Android application vulnerability detection method and Android application vulnerability detection system
CN104933362A (en) * 2015-06-15 2015-09-23 福州大学 Automatic detection method of API (Application Program Interface) misuse-type bug of Android application software
CN105427172A (en) * 2015-12-04 2016-03-23 北京华热科技发展有限公司 Risk assessment method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
睢辰萌: "基于漏洞分析的软件安全性评估系统研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
黎学斌: "基于AHP和CVSS的信息系统评估", 《西安邮电大学学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110808947A (en) * 2019-05-23 2020-02-18 南瑞集团有限公司 Automatic vulnerability quantitative evaluation method and system
CN110808947B (en) * 2019-05-23 2022-03-04 南瑞集团有限公司 Automatic vulnerability quantitative evaluation method and system
CN110831306A (en) * 2019-12-13 2020-02-21 杭州罗莱迪思照明系统有限公司 Intelligent lighting system and safety design method thereof
CN110831306B (en) * 2019-12-13 2022-05-17 杭州罗莱迪思科技股份有限公司 Intelligent lighting system and safety design method thereof

Also Published As

Publication number Publication date
CN107194259B (en) 2019-06-28

Similar Documents

Publication Publication Date Title
US20200195667A1 (en) Url attack detection method and apparatus, and electronic device
Das et al. Anomaly detection in industrial control systems using logical analysis of data
JP6389302B2 (en) System and method for identifying suspicious user behavior in user interaction with various banking services
CN107659543B (en) Protection method for APT (android packet) attack of cloud platform
Sommestad et al. The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures
CN106326742A (en) System and method for determining modified web pages
WO2022121145A1 (en) Ethereum phishing scam detection method and apparatus based on graph classification
CN109446817A (en) A kind of detection of big data and auditing system
Delamaro et al. Using concepts of content‐based image retrieval to implement graphical testing oracles
CN102045358A (en) Intrusion detection method based on integral correlation analysis and hierarchical clustering
Younis et al. Comparing and evaluating CVSS base metrics and microsoft rating system
CN107918911A (en) System and method for performing safe web bank transaction
CN112187716B (en) Knowledge graph display method for malicious codes in network attack
CN114091042A (en) Risk early warning method
Alhassan et al. A fuzzy classifier-based penetration testing for web applications
CN107194259A (en) A kind of leak severity comprehensive estimation method and system based on attack process
Fan et al. Smart contract scams detection with topological data analysis on account interaction
Hao et al. SCScan: A SVM-based scanning system for vulnerabilities in blockchain smart contracts
Boer et al. Algorithm Assurance: Auditing Applications of Artificial Intelligence
Haidar et al. E-banking Information Security Risks Analysis Based on Ontology
Wu et al. Towards Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum Heists
Fernandez et al. Evaluating the degree of security of a system built using security patterns
Pedraza-García et al. Mitigating security threats using tactics and patterns: A controlled experiment
Zhou Security risk analysis based on data criticality
Sahifa Implementation of intrusion detection systems to detect phishing in the banking industry

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant