东南大学学报(英文版)
東南大學學報(英文版)
동남대학학보(영문판)
JOURNAL OF SOUTHEAST UNIVERSITY
2011年
2期
144-147
,共4页
信息安全经济学%防火墙%入侵检测系统%漏洞扫描%安全组合策略
信息安全經濟學%防火牆%入侵檢測繫統%漏洞掃描%安全組閤策略
신식안전경제학%방화장%입침검측계통%루동소묘%안전조합책략
economics of information systems%firewall%intrusion detection system (IDS)%vulnerability scan%security portfolio strategy
为了解决基于攻击检测的综合联动控制问题,用博弈论方法对防火墙、入侵检测系统(IDS)和漏洞扫描技术的安全组合模型进行分析.采用逆序归纳法研究了仅配置IDS和漏洞扫描技术组合、配置所有技术组合的Nash均衡.结果表明,当IDS和漏洞扫描技术检测率较低时,公司不仅需要监测每个报警的用户,还需监测未报警的一部分用户;当IDS和漏洞扫描技术检测率足够高时,公司无需监测未报警用户,只需监测一部分报警的用户.在信息系统中增加配置防火墙会影响公司和黑客的收益,但黑客的最优策略没有变化,IDS的最优调查策略仅在一定情况下会改变.此外,讨论了IDS与漏洞扫描、防火墙与IDS的配置交互问题.
為瞭解決基于攻擊檢測的綜閤聯動控製問題,用博弈論方法對防火牆、入侵檢測繫統(IDS)和漏洞掃描技術的安全組閤模型進行分析.採用逆序歸納法研究瞭僅配置IDS和漏洞掃描技術組閤、配置所有技術組閤的Nash均衡.結果錶明,噹IDS和漏洞掃描技術檢測率較低時,公司不僅需要鑑測每箇報警的用戶,還需鑑測未報警的一部分用戶;噹IDS和漏洞掃描技術檢測率足夠高時,公司無需鑑測未報警用戶,隻需鑑測一部分報警的用戶.在信息繫統中增加配置防火牆會影響公司和黑客的收益,但黑客的最優策略沒有變化,IDS的最優調查策略僅在一定情況下會改變.此外,討論瞭IDS與漏洞掃描、防火牆與IDS的配置交互問題.
위료해결기우공격검측적종합련동공제문제,용박혁론방법대방화장、입침검측계통(IDS)화루동소묘기술적안전조합모형진행분석.채용역서귀납법연구료부배치IDS화루동소묘기술조합、배치소유기술조합적Nash균형.결과표명,당IDS화루동소묘기술검측솔교저시,공사불부수요감측매개보경적용호,환수감측미보경적일부분용호;당IDS화루동소묘기술검측솔족구고시,공사무수감측미보경용호,지수감측일부분보경적용호.재신식계통중증가배치방화장회영향공사화흑객적수익,단흑객적최우책략몰유변화,IDS적최우조사책략부재일정정황하회개변.차외,토론료IDS여루동소묘、방화장여IDS적배치교호문제.
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are Iow, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases.Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.