期刊文献+

基于系统状态集合的攻击模型及其应用 被引量:9

Attack model and its application based on system states aggregation
下载PDF
导出
摘要 为了评价系统的安全状况,对可能发生的攻击行为进行预警,提出了一种基于系统状态集合的攻击模型,使用系统状态的集合对系统的安全威胁进行抽象,并将攻击过程描述为系统状态集合的改变。同时还描述了一种利用此攻击模型进行攻击检测和预警的方法。基于该模型,实现了一个安全预警的原型系统。实验结果表明该系统能够有效检测攻击过程,并预测出系统可能达到的危险等级。 In order to evaluate a system's security and predict the attack actions, an attack model based on system states' aggregation was presented. In the model, the threat was Abstracted as the aggregation of the system's states, and the attack process was depicted as the change of the system states' aggregation. A method of detecting network attacks and early warning using the model was also described. Based on the model, an early warning prototype was implemented. Our experiment shows that the prototype is able to detect attack processes effectively and predict the possible risk level the system will reach.
出处 《计算机应用》 CSCD 北大核心 2005年第7期1535-1539,共5页 journal of Computer Applications
基金 国家863计划项目(2003AA142010)
关键词 攻击模型 攻击行为 攻击过程 攻击过程检测 安全预警 attack model attack action attack process attack process detection early warning
  • 相关文献

参考文献12

  • 1VAN DOORN L. Computer Break-ins: A Case Study [A]. NLUUG proceedings [C], 1992.
  • 2BOULANGER A . Catapults andgrappling hooks : The tools and techniques of information warfare [J/OL].IBM Systems Journal,1998, 37(1).
  • 3Common Vulnerabilities and Exposures [ EB/OL]. http://cve, mitre. org, 2003 -08.
  • 4王晓程,刘恩德,谢小权.攻击分类研究与分布式网络入侵检测系统[J].计算机研究与发展,2001,38(6):727-734. 被引量:75
  • 5SCHNEIER B. Attack Trees: Modeling Security, Threats [J]. Dr.Dobb's Journal, 1999, 12(24): 21-29.
  • 6MOORE AP, ELLISON RJ, LINGER RC. Attack modeling for information security and survivability [R]. CMU/SEI-2001-TN-001,2001.
  • 7TIDWELL T, LARSON R, FITCH K, et al. Modeling Interact Attacks [A]. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security [C], 2001. 54 -59.
  • 8HUANG M-Y, WICKS TM. A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis [A]. Proceedings of the First International Workshop on Recent Advances in Intruslon Detection [C], 1998.
  • 9MCDERMOTY J. Attack Net Penetration Testing [A]. The 2000 New Security Paradigms Workshop [C], 2000. 5 - 22.
  • 10STEFFAN J,SCHUMACHER M. Collaborative attack modeling[A]. Proceedings of SAC [C], 2002.

二级参考文献2

共引文献74

同被引文献59

引证文献9

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部