作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2018, Vol. 44 ›› Issue (5): 78-82. doi: 10.19678/j.issn.1000-3428.0046075

• 移动互联与通信技术 • 上一篇    下一篇

基于图的可扩展移动应用安全评估模型

陈璐 1,刘行 2,陈牧 1,李尼格 1,戴造建 1   

  1. 1.全球能源互联网研究院有限公司 信息网络安全国网重点实验室,南京 210003; 2.南京南瑞信息通信科技有限公司,南京 210003
  • 收稿日期:2017-02-23 出版日期:2018-05-15 发布日期:2018-05-15
  • 作者简介:陈璐(1984—),女,工程师、硕士,主研方向为移动通信、信息安全、移动应用安全;刘行、陈牧,工程师、硕士;李尼格、戴造建,高级工程师。
  • 基金资助:

    国家电网公司科技项目“电力移动应用信息安全防护关键技术研究”(SGRIXTKJ[2016]183号)。

Scalable Security Evaluation Model of Mobile Application Based on Graph

CHEN Lu  1,LIU Xing  2,CHEN Mu  1,LI Nige  1,DAI Zaojian  1   

  1. 1.State Grid Key Laboratory of Information and Network Security,Global Energy Interconnection Research Institute Co.,Ltd.,Nanjing 210003,China;2.Nanjing NARI Information Communication Technology Co.,Ltd.,Nanjing 210003,China
  • Received:2017-02-23 Online:2018-05-15 Published:2018-05-15

摘要:

目前针对移动应用的安全评估方法多数关于漏洞收集和恶意样本行为的关联挖掘,难以应对移动应用快速增多的现状。为此,将安全漏洞和攻击威胁作为节点,基于攻击图的方式构建移动应用安全威胁评估模型。使移动应用的安全漏洞和攻击威胁基于关联性相互连接,在评估移动应用的安全威胁时量化漏洞风险值并考虑其关联性对评估结果的影响。实验结果表明,该模型能够提高移动应用安全威胁评估的准确性,并且适用于大规模移动应用模型的构建,具有良好的可扩展性。

关键词: 移动应用;评估模型;安全漏洞;攻击威胁;风险值 移动应用, 评估模型, 安全漏洞, 攻击威胁, 风险值

Abstract:

At present,the evaluation methods of mobile application mostly focus on the association mining of the vulnerability collection and malicious sample behaviors,which is difficult to cope with the rapid increase in mobile applications.Aiming at this problem,based on the attack graph,this paper takes security loopholes and attack threats as node and establishes a mobile application security threat assessment model.It makes the mobile application vulnerabilities and attack threats interconnected based on the relevance.At the same time,it considers the quantification of the vulnerability risk value and the impact of the relevancy on the assessment results when evaluating the security threats of mobile application.Experimental results show that this model can improve the accuracy of mobile application security threat assessment,and can be used for large-scale mobile application model building with good scalability.

Key words: mobile application, evaluation model, security vulnerability, attack threat, risk value

中图分类号: