期刊文献+

网络攻击图的自动生成 被引量:13

Automatic Generation of Network Attack Graph
下载PDF
导出
摘要 网络攻击图是分析网络安全性的一个重要手段,对网络安全策略的制定具有重要指导意义。网络攻击图的自动生成是近年来国内外研究的一个热点。通过对大量网络弱点的分析,结合网络的特性,建立了网络安全性分析模型,设计并实现了一个网络攻击图自动生成原型系统。 Network attack graph is an important method to analyze the security status of computer network, and it plays a guiding role for the establishment of network security policy. Recently, automatic generating of network attack graph is a hot topic for the domestic and overseas researchers. After analyzing lots of network vulnerabilities and the characteristic of computer network, the model of network security status was built, and the prototype of network attack graph automatic generating system was designed and implemented.
出处 《计算机应用研究》 CSCD 北大核心 2006年第3期119-122,共4页 Application Research of Computers
基金 国防"十五"预研安全性分析项目(41315.7.1)
关键词 网络安全 网络攻击图 弱点 Network Security Network Attack Graph Vulnerability
  • 相关文献

参考文献18

  • 1R Ritchey,P Ammann.Using Model Checking to Analyze Network Vulnerabilities[C].Proceedings of the IEEE Symposium on Security and Privacy,2001.156-165.
  • 2O Sheyner,J Haines,S Jha,et al.Automated Generation and Analysis of Attack Graphs[C].Proceedings of IEEE Symposium on Security and Privacy,2002.273-284.
  • 3O Sheyner.Scenario Graphs and Attack Graphs[D].Carnegie Mellon University,2004.
  • 4C Ramakrishnan,R Sekar.Model-based Vulnerability Analysis of Computer Systems[C].Proceedings of the 2nd International Workshop on Verification,Model Checking and Abstract Interpretation,1998.
  • 5V Kumar,J Srivastava,A Lazarevic.Managing Cyber Threats:Issues,Approaches and Challenges[M].Kluwer Academic Publishers,2003.247-266.
  • 6P Ammann,D Wijesekera,S Kaushik.Scalable,Graph-based Network Vulnerability Analysis[C].Proc.of the 9th ACM Conference on Computer and Communications Security,2002.217-224.
  • 7C Phillips,L Swiler.A Graph-based System for Network Vulnerability Analysis[C].Proceedings of the 1998 Workshop on New Security Paradigms Table of Contents,1998.71-79.
  • 8L Swiler,C Philips,D Ellis,et al.Computer-Attack Graph Generation Tool[C].Proc.of DARPA Information Survivability Conference and Exposition,2001.146-161.
  • 9汪渊,蒋凡,陈国良.基于图论的网络安全分析方法研究与应用[J].小型微型计算机系统,2003,24(10):1865-1869. 被引量:19
  • 10S Templeton,K levitt.A Requires/Provides Model for Computer Attacks[C].Proceedings of the 2000 Workshop on New Security Paradigms Table of Contents,2001.31-38.

二级参考文献18

  • 1Lowe G, Roscoe B. Using CSP to detect errors in the TMN protocol)[J]. IEEE Transactions on Software Engineering, 1997, 23(10), 659 -669.
  • 2Robert Thorhuus. Software fault injection testing [J]. Ericsson Telecom, Stockholm, Sweden, 2000,2.
  • 3John D Howard. An analysis of security incident on the internet[D]. Carnegie Mellon University, West Lafayette , USA, 1997.
  • 4Rodolphe Ortalo, Yves Deswarte, Mohamed Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security [R]. LAAS Report 96369, 1997,1.
  • 5Mare Daeier, Yves Deswarte, Mohamed Kaaniehe. Quantitative assessment of operational security: models and tools[R]. LAAS Research Report 96493, 1996, 5.
  • 6Steve Miksell, Scott Nainis W, Henry M James. Security vulnerability assessment tools for internet applications[Z]. White Paper, Information Technology Support Center, 2001,3.
  • 7John D McLean. Security model [J]. Encyclopedia of Software Engineering[M] ,Wiley & Sons. Inc , 1994.
  • 8Saaty T L . How to make a decision:the analytic hierarchy process [J]. European Journal of Operational Research, 1990, 1(48) : 9- 26.
  • 9Shafer G &Logan R. Implementing dempster's rule for hierarchical evidence[J]. Artificial Intelligence, i987,33:271-298.
  • 10汪立东.[D].哈尔滨工业大学,2002.

共引文献53

同被引文献121

引证文献13

二级引证文献82

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部