%0 Journal Article %T Distributed Network Risk Assessment Method Based on Attack Graph
基于攻击图的分布式网络风险评估方法 %A 方 明 %A 徐开勇 %A 杨天池 %A 孟繁蔚 %A 禹 聪 %J 计算机科学 %D 2013 %I %X Evaluating risk effectively, selecting effective defence measures and defending information threats actively are the key points of resolving security problems of information system. Based on the actual requirements and status of risk assessment of information security, we integrated attack graph to apply it in studying risk assessment of information security. Firstly, focused on the uncertainty and complexity of risk assessment of information security, we integrated the technology of vulnerabilities associated with to apply it in studying risk assessment. On the other hand,since the attack path described by attack graph model is suited for the quantity data processing, and poor to the qualitative analysis, and risk is uncertain, we quantized the risk factors by the probability of attack path forming proposed in this dissertation, pre-treated the probability of atom attack, and proposed a risk assessment method based on attack graph model. The method takes full advantage of computing power of each host in the network,greatly shortens the attack graph generation time. %K Network security risk assessment %K Security risk probability %K Attack graph
安全风险概率,网络安全风险评估,攻击图 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=D8CF0D2A1D9D33615EB0C001CFA10006&yid=FF7AA908D58E97FA&vid=1371F55DA51B6E64&iid=0B39A22176CE99FB&sid=12DC19455C3A2FA8&eid=3986B25773CB6C30&journal_id=1002-137X&journal_name=计算机科学&referenced_num=0&reference_num=0