• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Network Security Situation Awareness Framework based on Threat Intelligence

    2018-10-09 08:45:28HongbinZhangYuziYiJunsheWangNingCaoandQiangDuan
    Computers Materials&Continua 2018年9期

    Hongbin Zhang , Yuzi Yi , Junshe Wang Ning Cao and Qiang Duan

    Abstract: Network security situation awareness is an important foundation for network security management, which presents the target system security status by analyzing existing or potential cyber threats in the target system. In network offense and defense,the network security state of the target system will be affected by both offensive and defensive strategies. According to this feature, this paper proposes a network security situation awareness method using stochastic game in cloud computing environment, uses the utility of both sides of the game to quantify the network security situation value. This method analyzes the nodes based on the network security state of the target virtual machine and uses the virtual machine introspection mechanism to obtain the impact of network attacks on the target virtual machine, then dynamically evaluates the network security situation of the cloud environment based on the game process of both attack and defense. In attack prediction, cyber threat intelligence is used as an important basis for potential threat analysis. Cyber threat intelligence that is applicable to the current security state is screened through the system hierarchy fuzzy optimization method, and the potential threat of the target system is analyzed using the cyber threat intelligence obtained through screening. If there is no applicable cyber threat intelligence, using the Nash equilibrium to make predictions for the attack behavior. The experimental results show that the network security situation awareness method proposed in this paper can accurately reflect the changes in the network security situation and make predictions on the attack behavior.

    Keywords: Situation awareness, stochastic game, cloud computing, virtual machine introspection, cyber threat intelligence, Nash equilibrium.

    1 Introduction

    With the rapid development of computer networks, network applications have penetrated into various industries and daily life. In recent years, the rapid expansion of new network architectures such as cloud computing has further increased the scale of the network. At the same time, network security events have emerged in an endless stream, complex and targeted cyber-attack have affected many industries such as finance, energy, and medical care, caused serious security problems. Therefore, it is crucial that the detection method distinguishes accurately and timely between normal network flow and cyber-attack with limited compute resources. Early single-point detection and defense technologies are difficult to effectively analyze the synergy and the stage of cyber-attack. As the threat landscape continues to change, and with more advanced attackers than ever, security teams need all the help they can get to more effectively prevent, detect and respond to threats [Shackleford (2018)]. In order to adapt to the problems brought about by new types of cyber threats, and to assess the overall security status and security situation change trends of the network, the security situation awareness system has become a research hotspot at the present stage. The emergence of cyber threat intelligence (CTI) in recent years has brought new ideas to the study of situation awareness systems, CTI is referred to as the task of gathering evidence-based knowledge, including context,mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decision regarding the subject’s response to that menace or hazard [McMillan (2013)]. CTI describes the attack behavior, and provides context data for network attacks, and guides the defense of network attacks.

    There are a large number of virtual machines (VM) in cloud computing, so the security of virtual machines is crucial to cloud computing. This paper takes the security status of VM as the situation analysis node, and uses virtual machine introspection (VMI) [Garfinkel(2003)] to monitor the running state of the target virtual machine (TVM). By analyzing the game process between attack and defense, the TVM security situation is obtained, and then achieves the network security situation of the cloud computing environment. In the prediction of attack behavior, a combination of CTI and Nash equilibrium [Nash (1951)]is used. When CTI is applicable, CTI is used as a prediction basis for attack behavior, the related context data of CTI is used to analyze the potential threats of the target system. If there is no applicable CTI, Nash equilibrium is used to predict the attack action.

    The rest of this paper is organized as follows. In Section 2, we present the related work.Section 3 gives the preliminaries of this paper. Section 4 describes the use of stochastic game models to analyze network security posture. Section 5 presents a potential threat analysis method that uses CTI and Nash equilibrium. Section 6 experimentally verifies the feasibility of the proposed method. We conclude the whole paper in Section 7.

    2 Related work

    Research on the network security situation awareness, Bhatt et al. [Bhatt, Yano and Gustavsson (2014)] divides attacks into multiple attack stages. First, the alarm is verified through network configuration information and vulnerability information, then the validate valid alarm is matched with the known attack stage to identify the entire attack process. This attacks scenario-based method can efficiently identify the known attack behavior, but it cannot identify unknown attack behaviors. In the context of Markov models for security situation awareness, Farhadi et al. [Farhadi, Amirhaeri and Khansari(2011)] using Markov to calculate the state transition probability of the network and analyzing the attacking trend. The Markov model-based method requires that each stage of the multistep attack is continuous and has no steps to be lost, it requires longer observation sequences to train the parameters of Markov model. With the increase in the size of the network, the probability of state transition between attacks is difficult to calculate and the scalability is not ideal. In another work [Ye, Xu and Qi (2013)], the vulnerability of the target system is analyzed synthetically by constructing attack graphs,and the maximum probability of the attack path is calculated. This paper aimed at the algorithm complexity of attack graph construction, and proposed a method of target environment preprocessing, which can reduce the complexity of the algorithm in the process of attack path analysis. However, when the network environment changes, it needs to model the environment again, not well adapted to network changes. In the prediction of attack actions, Fachkha et al. [Fachkha, Bouharb and Debbabi (2013)]combining time series analysis techniques with probabilistic models, data mining and other techniques to analyze DDoS attack characteristics and behavior changes. Through the events that occur at time T, predict T+1, T+2, . . . , T+n events. Although this method can reduce the training overhead, it cannot effectively handle a large number of data sets,and the method requires strict assumptions for the data generation process. Wu et al. [Wu,Ota, Dong et al. (2016)] proposed a combination of fuzzy clustering and game theory,which improves the efficiency of forecasting, but requires high level of attack and defense modeling of the network, there are many factors to consider.

    By analyzing the advantages and disadvantages of the above research, this paper proposed a security situation awareness method for cloud computing using stochastic game and CTI. The VMI is used to monitor the CPU status, memory and network information of the target virtual machine, quantifies the security situation of the cloud environment through the game process of attack and defense, and uses a combination of CTI and Nash equilibrium to predict the attack.

    3 Preliminaries

    Cloud computing is a computing method that provides dynamic and easily scalable virtualized resources and data to users over the Internet. Virtualization is the most important technology to support cloud computing. The concept of virtualization and virtual machines were proposed by IBM in the 1960s. It mainly aims to simplify management and optimize resources by re-planning limited and fixes resources according to different needs. According to the characteristics of cloud computing virtualization, we used VM as security situation analysis nodes and use VMI as the monitoring mechanism to collect TVM operational data.

    VMI technology is a technology that obtains guest operating system (OS) bottom state information from external, the information obtained includes: CPU registers, I/O controller registers, memory, mass storage devices, and network traffic data. Through VMI technology, it is possible to effectively monitor or interfere with the guest OS running status in an Introspecting Virtual Machine (IVM). The VMI architecture is shown in Fig. 1.

    Figure 1: The architecture of VMI

    IVM is highly decoupled and isolated from untrusted VM which are assumed to be unable to access or tamper the hypervisor. It has a complete view and can access to all guest OS states, and it is capable of modifying any of these states and interfering with every guest OS activity due to the interposition of the hypervisor between the guest OS and the underlying hardware [Hebbal, Laniepce and Menaud (2015)]. We use VMI to monitor CPU and memory usage, network transmission rate and delay rate, and use these data to determine the impact of attack on TVM. However, the state data obtained by using VMI is expressed in binary form. It is necessary to use the kernel data structure and other knowledge to obtain the high-level semantics of binary data, this semantic difference is called the semantic gap[Chen and Noble (2013)]. We selected LibVMI [Payne and Bryan (2012)] as an introspection tool in the existing methods. LibVMI is an introspection library that deals with this knowledge gap by providing a standard set of tools and API’s that are updated with releases of popular operating systems [Lamps, Palmer and Sprabery (2014)]. It also supports KVM hypervisor in addition to Xen and improves the overall performance by using multiple optimized caches. Notably, LibVMI integrates the popular memory forensics framework Volatility [Volatility (2018)], benefiting hence from its memory analysis capabilities [Hebbal, Laniepce and Menaud (2015)].

    4 Stochastic game model

    In the aspect of network security situation assessment, we selected the stochastic game model to model the network attack and defense process. The stochastic game is a dynamic game process in which one or more players participate and there is a transfer of state probabilities. In an offensive and defensive environment of the network, both offensive and defensive operations will lead to the transition of the target system's network system status, and then both offensive and defensive players continue to select an action strategy based on the new network status, and so on. The network security state reflects the impact of attack and defense strategies on the target system, and the network security state has a certain transition probability, which is consistent with the process described by the stochastic game. Therefore, we used the network attack and defense model based on stochastic game (AD-SG) to analyze the network security situation in the game phase.

    Definition 1.AD-SG is a 6-tuple, AD ? SG = (P,S, Aa, Ad,U,β). The meaning of each element in the tuple is as follows:

    P: It is the set of players in the game. In network attack and defense, the players are attacker Paand defender Pd, so P={Pa,Pd}.

    S: It is the set of TVM network security status. S={S1,S2,…,Sk}, TVM network security status is determined by both offensive and defensive strategies, among them,Sk=, it indicates the network state of node N when i and j are taken separate by both sides.

    Aa: It is the set of attacker’s optional strategies,

    Ad: It is the set of defender’s optional strategies, Ad=

    U: It is the utility function of players, U={Ua,Ud}. Uaindicating the attacker’s utility function, Udindicates the defender’s utility function.

    β: It is a status transition probability function for TVM security. It is determined by the attack success rate.

    In the course of the game between the two parties, each pursuing the maximization of utility, any party adopting a strategy will produce costs and benefits, and utility is the difference between income and cost. We considered the increase in the cost of the other party’s strategy as a result of its own strategy.

    Attacker’s utility function Ua:

    In the formula: AR is the reward from adopting strategies for attackers. AC is the cost of taking a strategy for attackers. DC is the cost of adopting a strategy for the defensive party.

    Attack strategy reward AR:

    Among: β is attack success rate, which derived from historical information and statistics.ASis the degree of damage to TVM by the attack strategy i, refer to MIT Lincoln Laboratory's privilege-enhanced multi-dimensional attack classification method [Fried,Graf, Haines et al. (2000)] to quantify the damage degree of different attacks, specific values are shown in Tab. 1. EAindicates the impact of the attack strategy on the CPU and memory usage of the TVM, dividing the impact level into 4 levels,corresponding to 2, 5, 8, 10. EPindicates the impact of the attack strategy on the network transmission rate and delay rate, also it is divided into four levels according to the degree of influence, corresponding to the value of 2, 5, 8, 10.

    Table 1: Attack classification and damage degree

    Attack cost AC:

    AC is referred to the costs incurred by an attacker when he or she takes an attack strategy,including operating costs, expertise, and the degree of sanctions that might be imposed after the attack was discovered. The greater the authority gained by the attacker or the more serious the impact on the target, the higher the operating cost and expertise cost of the attacker, and the greater the possibility of being discovered, so the higher the degree of sanctions that may be imposed, based on the above analysis, it can be seen that the AC has a positive correlation with the AS. In this paper, we let AC=AS, which is:

    Defense costs DC:

    According to the classification of defense strategies, the defense costs are quantified and the defense strategy is divided into: no defense measures ?, monitoring protection measures DS. prevent preventing measures DF, repair protection measures DR[Xi, Yun,Zhang et al. (2014)], the defense cost DCare 0, 4, 8, 10 respectively.

    Through the above analysis, in the network security state in which the attacker adopts the strategyand the defender adopts the strategy, the attacker’s utility:

    In order to achieve the goal, the attacker causes losses to the target system, and the defender adopts a defensive strategy in order to reduce the loss of the system. According to the relativity of two parties’ interests, a non-cooperative zero-sum game is used to describe the game process of both parties, so the defender’s utility:

    The CIA security requirements model Asset=(C,I,A) describes confidentiality,integrity, and availability of hosts, in this paper, confidentiality, integrity and availability are assessed according to important, general and unimportant three levels, which are 10, 5 and 1 respectively. Based on the CIA security requirements model, the attack damage D is introduced to indicate the impact of network attacks on the confidentiality, integrity,and availability of TVM. D can be represented by vectors: D=(Dc,Di,Da), Dc,Di,Darespectively represent damage to confidentiality, integrity and availability, according to the degree of damage (low, medium, high) the value can be 1, 2, 3. Thus the weight of TVM can be obtained: Wn=Asset×D.

    13.Angel:In the second and third centuries, angels were recognized by the Church (Lindahl, McNamara, Lindow 10). According to the Apocalypse of Saint Paul , guardian66 angels protect the virtuous67 who have renounced68 the world (Lindahl, McNamara, Lindow). In some ways, the maiden has renounced the world when she left her father s house.

    The relative weight Wn′of node n can be represented as:

    According to the above analysis, the security situation S of the cloud computing can be comprehensively represented by the security status of each node:

    Similarly, the size of |S| reflects the degree of network security or dangerous state. When S>0, the network is in a safe state. When S<0, the network is in a dangerous state.

    5 Potential threat analysis

    In this paper, we use CTI and Nash equilibrium to analyze the potential threat in the target system and predict the attack. When the CTI exists the context-related data of security events in the target system, the context data is used as the basis for the attack behavior prediction. When the CTI is not applicable, the Nash equilibrium is used to predict the attack behavior. This section will describe the attack prediction methods in these two situations.

    5.1 Attack prediction using threat intelligence

    CTI includes a large amount of security event information. However, not all security event information is applicable to the current system state. In order to improve data accuracy and obtain contextual data related to security events, the concept of high-quality CTI is introduced in this paper, simultaneously, using system hierarchy fuzzy optimization method to obtain high-quality CTI. The definitions of internal CTI, external CTI and high-quality CTI are as follows:

    Definition 2. Internal cyber threat intelligence (ICTI). It is derived from the security event information in the target system and is obtained by integrating relevant data in security devices such as security information and event management (SIEM) and intrusion detection systems (IDS).

    Definition 3.External cyber threat intelligence (ECTI). It refers to the open source intelligence (OSINT) or the CTI provided by intelligence providers.

    Definition 4.High-quality cyber threat intelligence (HCTI). The ECTI which exists contextual data or related information of security events in the target system, and it is of guiding significance to defense.

    Several objects in the STIX are selected as the CTI analysis elements, and these analysis elements are used as CTI screening objects. We selected several key properties as analysis elements in five objects: Indicator, malware, observed data, tool, and vulnerability.

    1) Indicators contain a pattern that can be used to detect suspicious or malicious cyber activity. we use labels and patterns in the indicator as analysis elements.

    2) Malware is a type of TTP that is also known as malicious code and malicious software,using name and labels in the malware as one of the analysis elements.

    3) Observed Data conveys information that was observed on systems and networks.

    4) Tools are legitimate software that can be used by threat actors to perform attacks.Knowing how and when threat actors use such tools can be important for understanding how campaigns are executed.

    5) A Vulnerability is “a mistake in software that can be directly used by a hacker to gain access to a system or network” [Surhone, Tennoe and Henssonow et al. (2010)].

    The selected Objects and their properties are shown in Tab. 2:

    Table 2: The selected Objects and their properties

    The relationship between these Objects are shown in Fig. 2:

    Figure 2: The relationship structure of the selected Objects

    The Relationship ① and ② describes that the Indicator can detect evidence of the related malware and tool.

    The Relationship ③ documents that this Malware being used to exploit the Vulnerability.The Relationship ④ documents that this Malware uses the related tool to perform its functions.

    The relationship ⑤ meanings there are no relationships explicitly defined between the Observed Data object and other objects.

    The Relationship ⑥ documents that this Tool being used to exploit the Vulnerability.

    It is easy to determine whether the individual properties of the corresponding objects in the ICTI and ECTI are equal. Because of the close relationship between objects, in some cases,same objects in the different relationship can express different security events. Therefore,judging the matching degree of ICTI and ECTI is inaccurate by whether the properties are equal or not. The relationship between objects makes the ICTI and ECTI has fuzzy similarity. According to the hierarchical relationship between Objects and Properties in CTI,this paper adopts the system hierarchy fuzzy optimization method and uses the relative superiority degree of the target to judge the matching degree of ICTI and ECTI. Here is how to use the system hierarchy fuzzy optimization method to obtain HCTI:

    1) First of all, the ECTI is classified, the probability that the security event in the target system completely matches with an ECTI is low. And the same type of CTI contains more abundant information, so the same kind of CTI can used to analyze the follow-up security events, in this paper, we use the CAPEC-id [The MITRE Corporation (2011)] of the attack pattern in CTI as the CTI classification standard.

    2) Counting the objects’ occurrence frequency in ECTI, using frequency as an element in the eigenvalue matrix, and set weights on indicators at all levels. Tab. 3 shows an example of data statistics.

    Table 3: Objects and Properties weights and frequency of occurrence

    In Tab. 3, Objects represent five subsystems, properties represent evaluation factors under each system, W is the weight of objects, W′ is the weight of properties, Xmnis the frequency of occurrence of ICTI in ECTI, m=1,2,3,…,8.

    Let the subsystem i contain mievaluation factors, and the feature value vector of evaluation factor j is:

    Then, the eigenvalue matrix of the evaluation factors of the n items to be optimized for the subsystem i is represented as:

    In the formula, i=1,2,3,4,5; k=1,2,… ,mi;j=1,2,… ,n.

    3) Convert Eq. (9) to the target relative dominance degree matrix:

    In CTI matching, the higher the frequency, the better the result, so in the target relative dominance degree matrix, rijcan be obtained using Eq. (11):

    In the formula, ? and ? represent take large symbols and small symbols respectively,,represent the maximum and minimum eigenvalues of the target i respectively,j=1,2,3,…,n.

    4) Let the weight vector of mievaluation factors’ in the subsystem i be:

    The target relative degree of superiority uj(i)of the subsystem i can be expressed as:

    In the formula, i=1,2,3,4,5; k=1,2,… ,mi; j=1,2,… ,n; gk(i)=; bk(i)=; p is the distance parameter, using Euclidean distance, at this time p=2.

    This results in the superiority vector of n schemes in the system i:

    In the formula, i=1,2,3,4,5.

    5) The output of the unit system constitutes the input of the high-level unit system. Make:

    There are:

    At this time:

    This gives n target relative superiority vectors for high-level (Objects) unit systems:

    6) According to the principle of maximum degree of superiority, the results of Eq. (18)can be used to analyze superior goals. But we can see from the analysis of the physical meaning of the fuzzy optimization model [Li (2016)], When un>0.5, solution n has the necessity to participate in optimization, that is, if ? ui> 0.5, max(ui) is the target relative degree of superiority. In this paper, we consider max(ui) as HCTI.

    5.2 Prediction of attack actions using nash equilibrium

    Nash equilibrium means that the strategy of a player is an optimal response to the strategies of others. For every player, as long as other player does not change his strategy,he cannot improve his situation. In the network environment, the available vulnerabilities of the target system are limited. Therefore, the available policies of the two parties are also limited. The limited strategy determines that the transferable network security status is also limited. According to the Nash equilibrium existence theorem [Nash (1950)], there is an equilibrium point in the network offense and defense game model. Under the premise of a rational choice between both sides of the offensive and defensive sides, both parties hope to obtain the maximum benefit at the minimum cost. So the two sides will choose countermeasures according to each other’s tactics, and the best countermeasure will form a Nash equilibrium.

    Since the strategies adopted by both parties are not clear and unique, the Nash equilibrium under the hybrid strategy is used to express the two parties' strategies in the form of probability. The attacker selects a strategy with a probability distribution of Pa=(Pa1,Pa2,…,Pam), the defender selects a strategy with a probability distribution of Pd=(Pd1,Pd2,… ,Pdn). Under the mixed strategy, the two parties’ profit expectation is:

    From the above analysis, it can be known that the network offense and defense game model have a mixed strategyto reach the Nash equilibrium, wheresatisfies:

    6 Experimental verification

    Using the LLDOS1.0(inside) from the MIT Lincoln Laboratory’s DARPA2000 as the experimental data set and the security event information of the data set is made into CTI to verify the system hierarchy fuzzy optimization method. Since the data set does not include defense measures, we added a demilitarized zone (DMZ) to the original network topology of the data set, according to the vulnerability information and defense measures of the servers in the DMZ, the Nash equilibrium attack prediction method is verified. The experimental network topology is shown in Fig. 3. In this section, the content of the experiment is described in detail.

    Figure 3: Network topology

    6.1 Network security situation assessment

    LLDOS 1.0 includes a complete distributed denial of service attack scenario. The attack is divided into five phases:

    1) IPsweep from a remote site

    2) Probe of live IP’s to look for the sadmind daemon running on Solaris hosts

    3) Breakins via the sadmind vulnerability, both successful and unsuccessful on those hosts

    4) Installation of the trojan mstream DDoS software on three hosts.

    5) Launching the DDoS

    In LLDOS 1.0, the attacker successfully invaded three hosts, they are mill (172.16.115.20),pascal (172.16.112.50), and locke (172.16.112.10), and use these three hosts to launch a DDOS attack on the target host www.af.mil (131.84.1.31). As the attacker took the exact same intrusion means for three hosts, we used mill (172.16.115.20) as an example to analyze the security situation of a single host. Using wireshark to screen mill's relevant network traffic and import traffic into snort to get alarm information: Mill was attacked by IPsweep at 9:51:36 and Sadmind Ping attacked at 10:08:07. The attacker used the remote buffer overflow attack to invade the host after determining that mill running the sadmind service, after several attempts, he successfully obtained root authority at 10:33:29, then established a connection with mill through Telnet, and installed DDOS software on the host. Since the data set does not contain any defense information, the AD-SG model proposed in this paper is used to quantify the utility of the attacker to obtain the network security situation value. Mill’s network posture values and situation changes are shown in Fig. 4.

    Figure 4: Mill’s network security situation

    Figure 5: Security situation in the network environment

    In the overall network environment security situation analysis, weights are assigned to each host, and the CIA weights for mill, pascal, locke, and www.af.com are Asset1=(5,5,5), Asset2=(5,5,10), Asset3=(1,5,10) and Asset4=(5,5,10). Since each host is attacked by the same type of attacks during the same attack phase, the attack damages are divided into stages. In the first phase to the fifth phase, the attack damages are D1=(2,1,1), D2=(2,1,1), D3=(2,1,2), D4=(3,2,2), D5=(1,2,3). After assigning weights, calculating the security situation of the entire network environment. The results are shown in Fig. 5.Fig. 5 reflects the impact of the attack on the network environment. It can be seen that the probe attack has little impact on the network environment, subsequent buffer overflow attacks increasing the network security situation further. The attacker successfully obtained the root privileges of the three hosts poses a greater threat to the network environment. After installing the DDOS tools on these three hosts and taking an attack on the target, the availability of the target is affected, as the threats of the other three hosts have not been lifted, the security situation of the entire network environment has further increased. From the experimental results, we can see that the method proposed in this paper can reflect the impact of the attack on the network security situation.

    6.2 Attack prediction

    In the following content, we will introduce the both case of existing HCTI and does not existing HCTI. In the presence of HCTI, the system hierarchy fuzzy optimization method was highlighted, the HCTI obtained by this method can be used as a basis for attack prediction. In the absence of HCTI, predicting of attacking behavior in DMZ using Nash equilibrium.

    6.2.1 Threat intelligence extraction

    The security event described by the data source can be divided into two parts: the attacker invades intranet hosts and uses hosts to launch the DDOS attack. The first part consists of phase 1, 2, 3 and 4, the second part consists of phase 5 alone. In this paper, the information of the first part is chosen as the preferred object of the ECTI, and the potential threat is analyzed through the optimization results, that is, the information of the second part.

    Make the information of the first part into ICTI and add it to the ECTI, The ECTI used in the experiment can be divided into four categories according to CAPEC-id: CAPEC-24,CAPEC-47, CAPEC-185, CAPEC-122, the data source used for the experiment belongs to the CAPEC-47 category.

    Table 4: Evaluation factors weights and frequency of occurrence

    The weights and frequency of evaluation factors are shown in Tab. 4.

    According to Tab. 4, the evaluation characteristic matrix of the subsystem indicator is:

    The target relative degree of identity matrix obtained by Eq. (11) is:

    The weight vector for the subsystem indicator is:

    From the Eq. (13), the target relative degree of superiority vector for the subsystem indicator is:

    Similarly, by calculating the subsystems of malware, observed data, tool, and vulnerability, the target relative degree of membership of high-level cells can be obtained:

    The weight vector of the second-level subsystems is:

    From Eq. (17), the target relative superiority vector of the ICTI and ECTI can be obtained as:

    Figure 6: The result of system hierarchy fuzzy optimization method

    Fig. 6 shows the results of the ECTI screening using system hierarchy fuzzy optimization method.According to the experimental results and the principle of higher priority, it can be seen that the CAPE-47 type ECTI has the greatest reference value, and the experimental results are in line with the actual situation. The closest to its superiority is CAPEC-24,because both security events are buffer overflow. Therefore, some data in security events,especially labels, will have the same situation. Although it does not reach the maximum degree of superiority, it still has some reference value. CAPEC-122 is privilege abuse security events, in the target security event, the attacker tries a certain number of Telnet connections by obtaining the root privileges of internal hosts. Therefore, the ICTI and ECTI contains some of the same data, but the relative degree of superiority is 0.29 and does not reach the threshold. So this type of CTI is not considered as reference value.CAPEC-185 is malicious software download security events, although individual data is the same as ICTI, the overall difference is too great. Therefore, the degree of superiority is 0, which does not have any reference value.

    6.2.2 Nash equilibrium

    In the network environment shown in Fig. 3, Web Server, FTP Server, and Database Server are located in the DMZ. The attacker is located in the external network. The firewall allows external hosts to access the Web Server and FTP Server. Only the Web Server and FTP Server can access the Database Server.

    The vulnerability information of the three servers is shown in Tab. 5. According to the vulnerability information, the defensive party’s optional defense measures are shown in Tab. 6.

    Table 5: Vulnerability information

    Table 6: Defensive strategy

    According to the optional strategy of offense and defense, obtain the utility matrix of both parties through Eqs. (4) and (5):

    Calculating the Nash Equilibrium to obtain a mixed strategy probability distribution for both sides:=(0,0.31,0.69),=(0.54,0.46,0,0). The mixed strategy=(0,0.31,0.69) is a prediction of attack behavior. According to the prediction, the attacker’s most likely strategy is to exploit the Wu-Ftpd SockPrintf() vulnerability.

    7 Conclusion and future work

    This paper proposes a situational awareness method in cloud computing environment.With TVM’s network security status as the analysis node, the impact of attack behavior on TVM is obtained by VMI, through the game gains of both parties, the network security situation of cloud environment is obtained. In the situation prediction, the CTI and Nash equilibrium are combined to predict the attack behavior. The CTI context data provides real security event information and has a high reference value; when the CTI is not applicable, analyze offensive and defensive alternative strategies, using Nash equilibrium to predict attack behavior, so as to make up for the absence of relevant contextual data in CTI. In the next step, the proposed method is applied to the real environment, and the deficiencies in verification are improved.

    Acknowledgement:This research was supported in part by the National Natural Science Foundation of China under grant numbers 61672206, 61572170.

    国产av国产精品国产| 久久久久久久精品精品| 免费高清在线观看视频在线观看| 成人亚洲精品一区在线观看| 免费少妇av软件| 黄色怎么调成土黄色| 多毛熟女@视频| 亚洲美女视频黄频| 亚洲无线观看免费| 亚洲三级黄色毛片| 亚洲少妇的诱惑av| 蜜桃国产av成人99| 色婷婷久久久亚洲欧美| 日本猛色少妇xxxxx猛交久久| 2022亚洲国产成人精品| 大陆偷拍与自拍| 亚洲精华国产精华液的使用体验| 精品亚洲成a人片在线观看| 啦啦啦中文免费视频观看日本| 自拍欧美九色日韩亚洲蝌蚪91| 日本与韩国留学比较| 国产白丝娇喘喷水9色精品| 一级爰片在线观看| 国产深夜福利视频在线观看| 最近的中文字幕免费完整| 夜夜骑夜夜射夜夜干| 一区二区三区四区激情视频| 国产一区亚洲一区在线观看| 视频区图区小说| 男的添女的下面高潮视频| 满18在线观看网站| 亚洲av二区三区四区| 亚洲精华国产精华液的使用体验| 欧美精品高潮呻吟av久久| 飞空精品影院首页| 九色亚洲精品在线播放| 99久久精品国产国产毛片| 最近中文字幕高清免费大全6| 有码 亚洲区| 亚洲国产av影院在线观看| 91aial.com中文字幕在线观看| 国产精品一区二区三区四区免费观看| 亚洲精品久久成人aⅴ小说 | 97在线视频观看| 久久久久久伊人网av| 亚洲熟女精品中文字幕| av在线观看视频网站免费| 视频在线观看一区二区三区| 欧美最新免费一区二区三区| 国产精品99久久久久久久久| 亚洲精品一二三| 精品视频人人做人人爽| 国产亚洲精品第一综合不卡 | 少妇丰满av| 午夜日本视频在线| 肉色欧美久久久久久久蜜桃| 久久久久久久久久人人人人人人| 日本黄色日本黄色录像| 人人妻人人爽人人添夜夜欢视频| 久热这里只有精品99| 国产成人精品一,二区| 日日啪夜夜爽| 久久久久久久大尺度免费视频| 一级黄片播放器| 黄色视频在线播放观看不卡| 国产精品久久久久久精品电影小说| 老司机亚洲免费影院| 18禁在线无遮挡免费观看视频| 亚洲精品av麻豆狂野| 一二三四中文在线观看免费高清| 亚洲精品av麻豆狂野| 18禁在线播放成人免费| a级毛片免费高清观看在线播放| 黄片播放在线免费| 在线观看免费高清a一片| 亚洲精品日本国产第一区| 欧美xxxx性猛交bbbb| 亚洲av综合色区一区| 丝瓜视频免费看黄片| 久久久a久久爽久久v久久| 久久这里有精品视频免费| 久久精品国产亚洲av涩爱| 亚洲成人手机| 久久国产亚洲av麻豆专区| 久久午夜福利片| 在现免费观看毛片| 欧美xxxx性猛交bbbb| 香蕉精品网在线| 国产欧美日韩一区二区三区在线 | 男女边摸边吃奶| 亚洲色图 男人天堂 中文字幕 | 色网站视频免费| 亚洲av国产av综合av卡| 欧美人与性动交α欧美精品济南到 | 精品人妻偷拍中文字幕| 国产精品无大码| 国产成人免费观看mmmm| 国产精品三级大全| 久久 成人 亚洲| 中文乱码字字幕精品一区二区三区| 久久99热6这里只有精品| 高清在线视频一区二区三区| 成人午夜精彩视频在线观看| 欧美日本中文国产一区发布| 在线天堂最新版资源| 2022亚洲国产成人精品| 桃花免费在线播放| 日韩强制内射视频| videossex国产| 国产视频内射| 蜜桃国产av成人99| 亚洲图色成人| av在线app专区| 国产不卡av网站在线观看| 国产精品99久久久久久久久| 免费观看av网站的网址| 2022亚洲国产成人精品| 九九久久精品国产亚洲av麻豆| √禁漫天堂资源中文www| 一区二区三区四区激情视频| 在现免费观看毛片| 999精品在线视频| 国产免费又黄又爽又色| 91精品三级在线观看| 国产成人精品久久久久久| 哪个播放器可以免费观看大片| 爱豆传媒免费全集在线观看| 国产黄片视频在线免费观看| 最近手机中文字幕大全| 日韩一区二区三区影片| 午夜福利视频在线观看免费| 另类亚洲欧美激情| 熟女电影av网| 欧美精品一区二区免费开放| 一级片'在线观看视频| 青春草亚洲视频在线观看| 毛片一级片免费看久久久久| 亚洲国产色片| 狠狠精品人妻久久久久久综合| 国产乱人偷精品视频| 亚洲精品一二三| 成人亚洲欧美一区二区av| 亚洲精品自拍成人| 一级毛片 在线播放| 日本av手机在线免费观看| 国产在视频线精品| 久热久热在线精品观看| 久久精品熟女亚洲av麻豆精品| 亚洲国产日韩一区二区| 亚洲激情五月婷婷啪啪| 一区二区av电影网| 亚洲情色 制服丝袜| av不卡在线播放| 欧美日韩亚洲高清精品| 亚洲丝袜综合中文字幕| 久久精品人人爽人人爽视色| 午夜日本视频在线| 亚洲国产精品专区欧美| 亚洲欧洲精品一区二区精品久久久 | 人体艺术视频欧美日本| 欧美日韩成人在线一区二区| 日韩中文字幕视频在线看片| 丝袜美足系列| 国产乱来视频区| 亚洲av成人精品一区久久| 人妻制服诱惑在线中文字幕| 欧美精品一区二区大全| 亚洲av成人精品一二三区| 欧美日韩视频高清一区二区三区二| 国产精品熟女久久久久浪| 香蕉精品网在线| 国产av一区二区精品久久| 国产高清不卡午夜福利| 日本av免费视频播放| 男女边吃奶边做爰视频| 亚洲欧美日韩卡通动漫| 在线免费观看不下载黄p国产| 黑人巨大精品欧美一区二区蜜桃 | 80岁老熟妇乱子伦牲交| 久久女婷五月综合色啪小说| 国产精品无大码| 人人妻人人澡人人看| 国产精品女同一区二区软件| 亚洲欧美一区二区三区国产| 涩涩av久久男人的天堂| 在线精品无人区一区二区三| 永久网站在线| 亚洲天堂av无毛| 亚洲精品亚洲一区二区| 亚洲色图 男人天堂 中文字幕 | av网站免费在线观看视频| 少妇被粗大猛烈的视频| 一级片'在线观看视频| 国产成人a∨麻豆精品| 亚洲精品第二区| 丝瓜视频免费看黄片| 人妻一区二区av| 人妻夜夜爽99麻豆av| 国产一区二区在线观看av| 亚洲精品国产色婷婷电影| 亚洲精品国产av成人精品| 九九爱精品视频在线观看| 日韩欧美一区视频在线观看| 全区人妻精品视频| 欧美日韩视频精品一区| 国产精品三级大全| 日韩欧美精品免费久久| 婷婷成人精品国产| 午夜视频国产福利| 亚洲国产精品一区二区三区在线| 一区二区av电影网| 国产日韩一区二区三区精品不卡 | 亚洲国产毛片av蜜桃av| 五月开心婷婷网| 国产精品国产三级专区第一集| 一本色道久久久久久精品综合| 免费观看无遮挡的男女| 亚洲欧美一区二区三区国产| 亚洲第一av免费看| 五月开心婷婷网| 少妇被粗大猛烈的视频| 亚洲欧洲日产国产| 美女福利国产在线| 国产精品久久久久久精品古装| 欧美97在线视频| 国产男女超爽视频在线观看| av在线观看视频网站免费| 免费久久久久久久精品成人欧美视频 | 赤兔流量卡办理| 久久人妻熟女aⅴ| 亚洲国产av影院在线观看| 啦啦啦中文免费视频观看日本| 一边摸一边做爽爽视频免费| 日韩视频在线欧美| 国产av精品麻豆| 3wmmmm亚洲av在线观看| 久久人人爽av亚洲精品天堂| 国内精品宾馆在线| 狠狠精品人妻久久久久久综合| 99久久人妻综合| 三级国产精品片| 丰满乱子伦码专区| 国产黄频视频在线观看| 日韩,欧美,国产一区二区三区| 久久久久久久大尺度免费视频| 狂野欧美激情性xxxx在线观看| 9色porny在线观看| 亚洲婷婷狠狠爱综合网| 啦啦啦啦在线视频资源| 两个人免费观看高清视频| 精品熟女少妇av免费看| 69精品国产乱码久久久| 18禁在线播放成人免费| 最近的中文字幕免费完整| 久久精品熟女亚洲av麻豆精品| 午夜福利在线观看免费完整高清在| 色婷婷av一区二区三区视频| 久久久久久久精品精品| 成人二区视频| 亚洲精品一二三| 国产黄色免费在线视频| 有码 亚洲区| 中文字幕精品免费在线观看视频 | 狠狠精品人妻久久久久久综合| 国产精品99久久久久久久久| 亚洲av国产av综合av卡| 2018国产大陆天天弄谢| 亚洲综合精品二区| 久久精品国产a三级三级三级| 熟女av电影| 国产黄色免费在线视频| 黑人猛操日本美女一级片| 亚洲欧美日韩另类电影网站| 美女中出高潮动态图| 制服丝袜香蕉在线| 精品午夜福利在线看| 老司机影院成人| 精品一区二区三卡| 亚洲欧美一区二区三区黑人 | 久久久欧美国产精品| 日韩人妻高清精品专区| 日韩av免费高清视频| 一本大道久久a久久精品| 丝袜喷水一区| 一级毛片黄色毛片免费观看视频| 国产精品秋霞免费鲁丝片| 精品少妇内射三级| 女的被弄到高潮叫床怎么办| 人妻一区二区av| 日产精品乱码卡一卡2卡三| 黑人欧美特级aaaaaa片| 另类精品久久| 久久鲁丝午夜福利片| 3wmmmm亚洲av在线观看| 亚洲欧美日韩卡通动漫| 青春草国产在线视频| 人人妻人人爽人人添夜夜欢视频| 精品人妻偷拍中文字幕| 高清av免费在线| 简卡轻食公司| 精品一品国产午夜福利视频| 高清黄色对白视频在线免费看| 超色免费av| 最近中文字幕高清免费大全6| 三上悠亚av全集在线观看| 国产欧美亚洲国产| 3wmmmm亚洲av在线观看| 少妇猛男粗大的猛烈进出视频| 999精品在线视频| 久久久久国产网址| 成人手机av| 高清不卡的av网站| av线在线观看网站| 免费观看av网站的网址| 精品久久国产蜜桃| a 毛片基地| 精品一区二区三卡| av网站免费在线观看视频| 亚洲欧洲精品一区二区精品久久久 | 男女边摸边吃奶| 大片电影免费在线观看免费| 最近2019中文字幕mv第一页| 国产精品国产av在线观看| 亚洲精品久久久久久婷婷小说| 亚洲av电影在线观看一区二区三区| 老司机影院成人| 少妇的逼水好多| 91国产中文字幕| 一区二区三区四区激情视频| 高清在线视频一区二区三区| 久久人妻熟女aⅴ| 大片电影免费在线观看免费| 亚洲国产精品成人久久小说| 99久久精品一区二区三区| 男女边摸边吃奶| 天美传媒精品一区二区| 18禁动态无遮挡网站| 国产高清不卡午夜福利| 一边亲一边摸免费视频| 免费看av在线观看网站| 精品一区二区三卡| 视频在线观看一区二区三区| 亚洲av电影在线观看一区二区三区| 欧美日韩亚洲高清精品| 欧美最新免费一区二区三区| 18禁裸乳无遮挡动漫免费视频| 人妻人人澡人人爽人人| 欧美一级a爱片免费观看看| 亚洲av国产av综合av卡| 人人妻人人添人人爽欧美一区卜| 久久久久久人妻| 夫妻性生交免费视频一级片| 啦啦啦在线观看免费高清www| 简卡轻食公司| 欧美人与善性xxx| 日本wwww免费看| 在现免费观看毛片| 亚洲精品一二三| 日韩中字成人| 一级毛片我不卡| 免费人成在线观看视频色| 哪个播放器可以免费观看大片| 99九九在线精品视频| 欧美一级a爱片免费观看看| 国产黄色免费在线视频| 日日爽夜夜爽网站| 国产高清三级在线| 久久久午夜欧美精品| 免费观看无遮挡的男女| 丝袜喷水一区| 91国产中文字幕| 高清不卡的av网站| 精品一品国产午夜福利视频| 亚洲精品日韩av片在线观看| 能在线免费看毛片的网站| 免费看不卡的av| 精品国产乱码久久久久久小说| 亚洲国产最新在线播放| 亚洲国产毛片av蜜桃av| 边亲边吃奶的免费视频| 黑人猛操日本美女一级片| 国产精品久久久久久精品古装| 黄色配什么色好看| 99久久中文字幕三级久久日本| 国产精品久久久久久精品电影小说| 另类亚洲欧美激情| av播播在线观看一区| 亚洲成人手机| 国产精品国产av在线观看| 欧美日韩精品成人综合77777| 大香蕉97超碰在线| 国产午夜精品一二区理论片| 99热国产这里只有精品6| 亚洲精品日本国产第一区| 熟女av电影| 国产一区二区在线观看av| 午夜激情福利司机影院| 大香蕉久久网| 亚洲综合色网址| 亚洲精品中文字幕在线视频| 制服丝袜香蕉在线| 校园人妻丝袜中文字幕| 丝瓜视频免费看黄片| 国产精品 国内视频| 色视频在线一区二区三区| 精品亚洲成国产av| 亚洲激情五月婷婷啪啪| 精品少妇久久久久久888优播| 国产精品麻豆人妻色哟哟久久| 欧美精品一区二区免费开放| 国产老妇伦熟女老妇高清| 国产成人freesex在线| 国产精品人妻久久久影院| 欧美亚洲日本最大视频资源| 99视频精品全部免费 在线| 制服人妻中文乱码| 久久久a久久爽久久v久久| 欧美日韩视频精品一区| 曰老女人黄片| 九草在线视频观看| 一级a做视频免费观看| 飞空精品影院首页| 国产有黄有色有爽视频| 亚洲情色 制服丝袜| 中文字幕久久专区| 成人黄色视频免费在线看| 一本一本综合久久| 国产探花极品一区二区| 精品久久蜜臀av无| 秋霞在线观看毛片| 精品国产一区二区三区久久久樱花| 国产精品一区二区在线不卡| 精品亚洲成国产av| 欧美人与性动交α欧美精品济南到 | 黄色毛片三级朝国网站| 久久国产精品男人的天堂亚洲 | 22中文网久久字幕| 黄片播放在线免费| 久久国产精品男人的天堂亚洲 | 国产欧美日韩综合在线一区二区| 大片免费播放器 马上看| 久久久久久久久久久丰满| 国产极品天堂在线| 高清视频免费观看一区二区| 国产精品国产av在线观看| 免费播放大片免费观看视频在线观看| 国产精品一区www在线观看| 亚洲成人av在线免费| 搡老乐熟女国产| 久久国产精品男人的天堂亚洲 | 久久国产精品男人的天堂亚洲 | 婷婷色麻豆天堂久久| 久久久久精品性色| 夜夜爽夜夜爽视频| 久久国产精品大桥未久av| 黄色一级大片看看| 国产一区二区在线观看av| 亚洲精品日本国产第一区| 久久这里有精品视频免费| 久久久午夜欧美精品| 2018国产大陆天天弄谢| 精品人妻熟女av久视频| 亚洲无线观看免费| 伊人亚洲综合成人网| 亚洲内射少妇av| 五月天丁香电影| av专区在线播放| 男女边摸边吃奶| 亚洲,一卡二卡三卡| 99久久人妻综合| 亚洲成人av在线免费| 国产精品秋霞免费鲁丝片| 大片免费播放器 马上看| 一区二区日韩欧美中文字幕 | 另类亚洲欧美激情| 精品久久久久久久久亚洲| 色婷婷久久久亚洲欧美| 一个人看视频在线观看www免费| 99久久中文字幕三级久久日本| 秋霞在线观看毛片| 久久女婷五月综合色啪小说| 一本—道久久a久久精品蜜桃钙片| 大片免费播放器 马上看| 免费少妇av软件| 精品久久久久久久久亚洲| 曰老女人黄片| 不卡视频在线观看欧美| 一级毛片 在线播放| 免费黄色在线免费观看| 国产探花极品一区二区| 九九久久精品国产亚洲av麻豆| 在线 av 中文字幕| av有码第一页| av又黄又爽大尺度在线免费看| 妹子高潮喷水视频| 在线天堂最新版资源| 免费大片18禁| 精品亚洲成国产av| 亚洲精品乱码久久久久久按摩| 日日爽夜夜爽网站| 久久久精品免费免费高清| 亚洲美女视频黄频| 久久久久久人妻| 2022亚洲国产成人精品| 一本久久精品| 在线观看免费视频网站a站| 亚洲伊人久久精品综合| 99热这里只有是精品在线观看| 男女免费视频国产| 91久久精品国产一区二区成人| 午夜免费观看性视频| 亚洲国产av影院在线观看| 日本黄色片子视频| 纵有疾风起免费观看全集完整版| 黄色怎么调成土黄色| 青春草视频在线免费观看| 日韩不卡一区二区三区视频在线| 99热全是精品| 国产精品久久久久久久电影| 亚洲色图综合在线观看| 国产av一区二区精品久久| 一本色道久久久久久精品综合| 99热这里只有是精品在线观看| 男女免费视频国产| 午夜福利影视在线免费观看| 亚洲在久久综合| 国产亚洲最大av| 乱码一卡2卡4卡精品| 亚洲精品,欧美精品| 精品一区二区三区视频在线| 久久久久久久久久人人人人人人| 91在线精品国自产拍蜜月| 97超碰精品成人国产| 有码 亚洲区| 欧美97在线视频| 99久久中文字幕三级久久日本| 美女视频免费永久观看网站| 成人毛片a级毛片在线播放| 精品卡一卡二卡四卡免费| 亚洲精品一二三| 亚洲综合色网址| 九九爱精品视频在线观看| 日产精品乱码卡一卡2卡三| 五月天丁香电影| 插逼视频在线观看| 啦啦啦中文免费视频观看日本| 久久久精品免费免费高清| 在线观看三级黄色| 精品亚洲成国产av| 久久久久久伊人网av| 99热这里只有精品一区| 午夜av观看不卡| av女优亚洲男人天堂| 波野结衣二区三区在线| 美女xxoo啪啪120秒动态图| 国产免费又黄又爽又色| 日本wwww免费看| 性色av一级| 18在线观看网站| 午夜福利影视在线免费观看| 精品国产露脸久久av麻豆| 久久青草综合色| 18+在线观看网站| 一本色道久久久久久精品综合| 香蕉精品网在线| 母亲3免费完整高清在线观看 | 高清不卡的av网站| 亚洲欧美成人精品一区二区| 亚洲内射少妇av| tube8黄色片| 亚洲色图 男人天堂 中文字幕 | 又大又黄又爽视频免费| 91精品国产九色| 中文欧美无线码| 99热全是精品| 只有这里有精品99| 人妻少妇偷人精品九色| 永久免费av网站大全| 亚洲精品国产av成人精品| 亚洲人成77777在线视频| 国产精品久久久久久av不卡| 女性生殖器流出的白浆| 高清不卡的av网站| 成人免费观看视频高清| 日本爱情动作片www.在线观看| 亚洲无线观看免费| 99九九线精品视频在线观看视频| 欧美激情 高清一区二区三区| 黑人猛操日本美女一级片| 久久毛片免费看一区二区三区| 黑人猛操日本美女一级片| 人妻 亚洲 视频| 国产精品一区二区在线不卡| 考比视频在线观看| 国国产精品蜜臀av免费| h视频一区二区三区| 久久ye,这里只有精品| 亚洲在久久综合| 啦啦啦中文免费视频观看日本| 色94色欧美一区二区| 久久国产亚洲av麻豆专区| 亚洲中文av在线| 亚洲成人手机| 最近中文字幕2019免费版| 一级毛片我不卡| 日本免费在线观看一区| 一级毛片我不卡| 欧美三级亚洲精品| 国产老妇伦熟女老妇高清| 亚洲av欧美aⅴ国产| 97精品久久久久久久久久精品| 国产极品天堂在线| 亚洲成人一二三区av| 最黄视频免费看| 久久精品国产鲁丝片午夜精品|