期刊文献+

基于有限状态机的多阶段网络攻击方法研究 被引量:2

The Research for Multi-stage Network Attacks Based on FSM
下载PDF
导出
摘要 提出了针对多阶段攻击分析的多阶段有限状态机模型,用于分析复杂的攻击行为。通过M-FSM模型能够对攻击的步骤和路径进行综合分析,从而发现网络中存在的安全漏洞和不当的安全配置。在对多阶段攻击进行综合分析的基础上,系统管理员可以以最小的投入对系统进行加固。 An M - FSM model is proposed for the multi - stage vulnerable operations. The goal of this M - FSM is to reason how the implemented step - by - step operation, or more precisely each step activity within the whole operation, contributes an attack goal. This model can be used in discovering attack paths to critical network resources. From these attack paths the system administrator can then derive an expression for network safety in terms of the initial configuration and take measures to reinforce the network.
出处 《空军工程大学学报(自然科学版)》 CSCD 北大核心 2006年第1期31-34,共4页 Journal of Air Force Engineering University(Natural Science Edition)
基金 国家自然科学基金资助项目(60572162)
关键词 攻击模型 多阶段攻击 有限状态机 风险评估 attack model multi -stage attack finite state machine risk assessment
  • 相关文献

参考文献5

  • 1门健.网络告警管理系统的设计与测试[J].空军工程大学学报(自然科学版),2004,5(4):63-66. 被引量:2
  • 2Taimur Aslam,Ivan Krsul,Spafford Eugene H.Use of A Taxonomy of Security Faults[A].Proceeding of the Nineteenth NIST-NCSC National Information Systems Security Conference[C].Baltimore:1996.551-560.
  • 3John Douglas Howard.An Analysis of Security Incidents on the Internet 1989-1995[R].Pittsburgh:Carnegie Mellon University,1997.
  • 4Steven J Templeton,Karl Levitt.A Requires/Provides Model for Computer Attacks[A].Proceeding of the New Security Paradigms Workshop 2000[C].New York:2000,31-38.
  • 5向尕,曹元大.基于攻击分类的攻击树生成算法研究[J].北京理工大学学报,2003,23(3):340-344. 被引量:8

二级参考文献12

  • 1向尕 曹元大 周旭.基于攻击树的IDS攻击模式自动建立研究[Z]..中国科协首届博士生学术交流大会[C].深圳,2002..
  • 2[4]Ron Patton.软件测试[M].北京:机械工业出版社,2002.
  • 3Neumann P G, Parker D B. A summary of computer misuse techniques [Z]. The 12th National ComputerSecurity Conf. Baltimore, Maryland, 1989.
  • 4Carl E L, John P M. A taxonomy of computer program security flaws with examples [R].Washington: Naval Research Laboratory, 1993.
  • 5Frank A, Andrew H, Shlomo H, et al. Detecting malicious software by monitoring anomalous windows registry accesses[Z]. The Fifth International Symposium on Recent Advances in Intrusion Detection(RAID-2002), Zurich, Switzerland, 2002.
  • 6John D H. An analysis of security incident on the internet[J]. West Lafayette: Computer Department,Carnegie Mellon University, 1995.
  • 7Indqvist U L, Jonsson E. How to systematically classify computer security intrusions [Z]. IEEE Symposium on Security and Privacy, Oakland, 1997.
  • 8Sandeep K. Classification and detection of computer intrusions[D]. West Lafayette: Computer Department Purdue University, 1995.
  • 9Helmer G,Wong J,Slagell M,et a1.A software fault tree approach to requirements analysis of an intrusion detection system[Z]. Symposium on Requirements Engineering for Information Security,Indianapolis,2001.
  • 10夏建东,王乐春,龚正虎.计算机网络性能基准测试研究[J].计算机工程与应用,2000,36(9):31-33. 被引量:13

共引文献8

同被引文献28

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部