[1]马荟平,李 鹏,肖 航,等.基于贝叶斯攻击图的 RFID 系统安全评估模型[J].计算机技术与发展,2024,34(02):113-119.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 017]
 MA Hui-ping,LI Peng,XIAO Hang,et al.RFID System Security Evaluation Model Based on Bayesian Attack Graph[J].,2024,34(02):113-119.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 017]
点击复制

基于贝叶斯攻击图的 RFID 系统安全评估模型()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
34
期数:
2024年02期
页码:
113-119
栏目:
网络空间安全
出版日期:
2024-02-10

文章信息/Info

Title:
RFID System Security Evaluation Model Based on Bayesian Attack Graph
文章编号:
1673-629X(2024)02-0113-07
作者:
马荟平1 李 鹏12 肖 航1 朱 枫12
1. 南京邮电大学 计算机学院,江苏 南京 210023;
2. 江苏省无线传感网络高技术研究重点实验室,江苏 南京 210023
Author(s):
MA Hui-ping1 LI Peng12 XIAO Hang1 ZHU Feng12
1. School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China;
2. Institute of Network Security and Trusted Computing,Nanjing 210023,China
关键词:
贝叶斯射频识别技术攻击图原子攻击属性节点安全评估
Keywords:
Bayesianradio frequency identificationattack graphatomic attackattribute nodesecurity evaluation
分类号:
TP393. 08
DOI:
10. 3969 / j. issn. 1673-629X. 2024. 02. 017
摘要:
针对目前 RFID( Radio Frequency Identification,射频识别技术) 系统安全分析中忽略攻击事件对系统安全状态动态影响的问题,为了有效实现 RFID 系统的安全风险评估,文章提出了一种基
于贝叶斯攻击图的 RFID 系统安全评估模型。该模型首先通过对 RFID 系统结构、所用协议进行分析确定系统的脆弱性漏洞及其依赖关系,建立攻击图。 针对攻击图模型只能进行定性分析的问题,构建出相应的攻击图模型结构后可以结合贝叶斯理论对其进行量化。 依据漏洞的利用难易度和影响程度建立 RFID 漏洞量化评价指标,计算出对应的原子攻击概率,然后以条件转移
概率的形式将攻击节点与RFID 系统的安全属性节点联系在一起,不仅能推断攻击者能够成功到达各个属性节点的风险概率,而且能够依据攻击者的不同行为动态展示系统风险状况的变化,实现评估不同状态下目标 RFID 系统的整体风险状况。 实验表明,所提模型可以有效地计算出 RFID 系统整体的风险概率,为后续实施对应的安全策略提供理论依据。
Abstract:
Aiming at the problem of ignoring the dynamic influence of attack events on the system security state in the current RFIDsystem security analysis,in order to effectively realize the security risk assessment of RFID system,we propose a security assessmentmodel of RFID system based on Bayesian attack graph. The model firstly determines the vulnerability and dependence of the system byanalyzing the RFID system structure and the protocol used, and establishes the attack diagram. For the problem that the attack graphmodel can only be qualitatively analyzed,the corresponding attack graph model structure can be quantified by combining Bayes theory.The RFID vulnerability quantitative evaluation index is established according to the exploit difficulty and impact degree of thevulnerability,the corresponding atomic attack probability is calculated,and then the attack node is associated with the security attributenode of the RFID system in the form of conditional transfer probability,which can not only infer the risk probability that the attacker cansuccessfully reach each attribute node. Moreover, it can dynamically display the changes of the system risk status according to thedifferent behaviors of the attacker,and realize the overall risk status of the target RFID system under different states. The experimentshows that the proposed model can effectively calculate the risk probability of the whole RFID system,and provide a theoretical basis forthe subsequent implementation of the corresponding security strategy.

相似文献/References:

[1]王军豪 彭岩.基于主观贝叶斯的点击流数据分析应用研究[J].计算机技术与发展,2008,(07):116.
 WANG Jun-hao,PENG Yan.Application and Research of Clickstream Data Analysis Based on Bayes[J].,2008,(02):116.
[2]王娟 柴玉梅.基于多议题协商的贝叶斯学习[J].计算机技术与发展,2006,(02):154.
 WANG Juan,CHAI Yu-mei.A Bayesian Learning Based on Multi- Issues Negotiation[J].,2006,(02):154.
[3]高志森 张铮 李俊.入侵检测中贝叶斯分类器改进的研究[J].计算机技术与发展,2006,(11):154.
 GAO Zhi-sen,ZHANG Zheng,LI Jun.Improved Bayesian Classifier of Intrusion Detection[J].,2006,(02):154.
[4]江欢 汤进 郭玉堂 罗斌.基于t混合模型的自动图像标注[J].计算机技术与发展,2010,(10):86.
 JIANG Huan,TANG Jin,GUO Yu-tang,et al.Automatic Image Annotation Based on t Mixture Model[J].,2010,(02):86.
[5]刘富春 周受钦.基于RFID的物流装备信息监控网络平台设计[J].计算机技术与发展,2012,(07):227.
 LIU Fu-chun,ZHOU Shou-qin.Monitoring Framework Design for Logistics Equipment Based on RFID[J].,2012,(02):227.
[6]孙科学,张瑛,周明秀.跳跃式二进制防碰撞算法的设计与实现[J].计算机技术与发展,2013,(04):59.
 SUN Ke-xue,ZHANG Ying,ZHOU Ming-xiu.Design and Implementation of an Anti-collision Algorithm of Jumping Binary[J].,2013,(02):59.
[7]张学军,陈彦君,常昆.改进型RFID相互认证协议研究[J].计算机技术与发展,2013,(08):129.
 ZHANG Xue-jun[],CHEN Yan-jun[],CHANG Kun[].An Improved RFID Mutual Authentication Protocol[J].,2013,(02):129.
[8]张建敏,王钢.基于WSID网络的智能监测技术的研究与实现[J].计算机技术与发展,2014,24(02):202.
 ZHANG Jian-min,WANG Gang.Research and Implementation of Intelligent Monitoring Technology Based on WSID[J].,2014,24(02):202.
[9]曾永忠[] []张帅[] 马忠权[]. 一种基于用户会话的异常检测方法[J].计算机技术与发展,2014,24(07):141.
 ZENG Yong-zhong[][],ZHANG Shuai[] A Zhong-quan[]. An Anomaly Detection Method Based on Session[J].,2014,24(02):141.
[10]张学军[][],马军飞[],鲁友[]. 基于位编码单元的双时隙防碰撞算法[J].计算机技术与发展,2014,24(09):93.
 ZHANG Xue-jun[][],MA Jun-fei[],LU You[]. A Bi-slot Anti-collision Algorithm Based on Bits Coding Unit[J].,2014,24(02):93.

更新日期/Last Update: 2024-02-10