作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (11): 148-151. doi: 10.3969/j.issn.1000-3428.2010.11.053

• 安全技术 • 上一篇    下一篇

面向主体脆弱性的权限控制安全分析模型

黄光球,李 艳   

  1. (西安建筑科技大学管理学院,西安 710055)
  • 出版日期:2010-06-05 发布日期:2010-06-05
  • 作者简介:黄光球(1964-),男,教授、博士,主研方向:网络安全,复杂系统建模、分析与控制,系统工程;李 艳,硕士研究生

Privilege Control Security Analysis Model Oriented to Subject Vulnerability

HUANG Guang-qiu, LI Yan   

  1. (School of Management, Xi’an University of Architecture & Technology, Xi’an 710055)
  • Online:2010-06-05 Published:2010-06-05

摘要: 在网络攻击过程中脆弱性存在于节点的部件主体上,针对该问题,将攻击描述细化到网络部件级,在原权限控制模型中增加对部件间权限、连接关系、属性的描述及脆弱性重写规则,构造NCVTG模型,提出复杂度为多项式时间的NCVTG模型图权限转移闭包生成算法用以评估网络的动态变化,给出当前脆弱性状态下的所有攻击路径。实验结果证明,该模型可对网络安全性进行综合分析,预测所有可能的攻击。

关键词: 网络安全分析模型, 攻击图, 权限获取-授予模型, 重写规则

Abstract: Because vulnerabilities exist in the components of the network nodes during attacking, this paper proposes Network Component Vulnerability Take-Grant(NCVTG) model to describe the network attack on the network components level. The model adds the precise description for the privilege, connection relation and attributes among the network components, and adds the vulnerabilities rewriting rules. A graph privilege transitive closure generation algorithm whose time complexity is polynomial time for NCVTG model is proposed. The algorithm can make dynamic security analysis when the network is changing, and give all attack paths in present vulnerability states. Experimental results prove that the model can make a comprehensive analysis on network security and predict all possible attacks.

Key words: network security analysis model, attack graph, privilege Take-Grant model, rewriting rule

中图分类号: