信息网络安全 ›› 2018, Vol. 18 ›› Issue (11): 81-88.doi: 10.3969/j.issn.1671-1122.2018.11.011

• • 上一篇    下一篇

基于风险矩阵的物联网系统漏洞关联性危害评估

任晓贤1(), 陈洁2, 李晨阳3, 杨义先3,4   

  1. 1.北方工业大学计算机学院,北京100144
    2. 四川省公安厅网络安全保卫总队,四川成都 610000
    3.北京邮电大学网络空间安全学院,北京100876
    4.贵州大学贵州省公共大数据重点实验室,贵州贵阳550025
  • 收稿日期:2018-09-20 出版日期:2018-11-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:任晓贤(1995—),女,北京,硕士研究生,主要研究方向为网络空间安全;陈洁(1980—),女,四川,本科,主要研究方向网络安全态势感知;李晨阳(1996—),女,山西,硕士研究生,主要研究方向为网络空间安全;杨义先(1961—),男,四川,教授,博士,主要研究方向为信息安全与密码学。

  • 基金资助:
    国家重点研发计划[2017YFB0802703];贵州省公共大数据重点实验室开放课题[2018BDKFJJ014]

Hazard Assessment of IoT Vulnerabilities Correlation Based on Risk Matrix

Xiaoxian REN1(), Jie CHEN2, Chenyang LI3, Yixian YANG3,4   

  1. 1. College of Computer Science and Technology, North China University of Technology, Beijing 100144, China
    2. Cyber Security Guard, Sichuan Provincial Public Security Department, Chengdu Sichuan 610000, China
    3. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    4. Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guizhou Guiyang 550025, China
  • Received:2018-09-20 Online:2018-11-10 Published:2020-05-11

摘要:

随着物联网的迅速发展和普及利用,针对物联网的攻击事件比例逐年上升。为了对物联网系统的漏洞进行科学评估,文章提出一种漏洞关联性危害评估方法。与传统的对单独漏洞进行孤立评估的方法不同,该方法利用CVSS v3评价指标,以漏洞关联图和风险矩阵为基础,同时考虑前序漏洞节点、后序漏洞节点的关联关系以及漏洞自身的因素,对漏洞进行关联评估。实验表明,该方法对网络安全的防护工作能够起到有效的指导作用,避免存在高关联性危害漏洞的物联网设备被攻击者控制发动DDoS攻击或者成为区块链的挖矿工具。

关键词: 物联网, 漏洞评估, 区块链, 关联性

Abstract:

With the rapid development and popularization of the Internet of Things(IoTs), the proportion of attacks on Internet of Things is increasing year by year. In order to scientifically evaluate the vulnerabilities of IoT system, this paper proposes a vulnerability correlation hazard assessment method. Unlike the traditional method of evaluating a single vulnerability in isolation, this vulnerability correlation assessment method uses the CVSS v3 evaluation index, based on the vulnerability correlation graph and the risk matrix, and takes into account the relationship between pre-order vulnerability node and pose-order vulnerability node and vulnerability itself. Experiments show that the method has effective guides for protection of cyberspace security and can avoid the IoT devices that have high correlation hazard vulnerabilities controlled by attackers to launch DDoS attacks or to become a blockchain mining tools.

Key words: IoT, vulnerability assessment, blockchain, correlation

中图分类号: