期刊文献+

基于攻击图模型的网络安全评估研究 被引量:54

Study of network security evaluation based on attack graph model
下载PDF
导出
摘要 介绍了利用攻击图模型方法分析计算机网络攻击行为的基本原理,给出了攻击图生成算法。研究了利用攻击图对网络系统安全性进行风险分析的方法。通过一个虚拟的网络环境对攻击图生成算法和网络系统的安全性分析评估方法进行了验证。 The principle by which to analyze computer network attacks using attack graph was introduced. An attack graph generating algorithm was proposed. The computer network system risk assessment methods were studied using the attack graph model. A virtual computer network environment was introduced by which the attack graph generating algorithm and computer network system security methods were validated.
出处 《通信学报》 EI CSCD 北大核心 2007年第3期29-34,共6页 Journal on Communications
基金 国家自然科学基金资助项目(60372039)~~
关键词 网络安全 攻击图 算法模型 风险评估 network security attack graph algorithm model risk assessment
  • 相关文献

参考文献25

  • 1邢栩嘉,林闯,蒋屹新.计算机系统脆弱性评估研究[J].计算机学报,2004,27(1):1-11. 被引量:84
  • 2SCHNEIER B.Secrets and Lies[M].John Wiley and Sons,2000.318-333.
  • 3SCHNEIER B.Attack trees:modeling security threats[J].Dr Dobb's Journal,1999,12(24):21-29.
  • 4TIDWELL T,LARSON R,FITCH K,et al.Modeling Internet attacks[A].Proceedings of the 2001 IEEE Workshop on Information Assurance and Security[C].2001.54-59.
  • 5王晓程,刘恩德,谢小权.攻击分类研究与分布式网络入侵检测系统[J].计算机研究与发展,2001,38(6):727-734. 被引量:75
  • 6庄朝辉.基于攻击树的多层次入侵检测及其在Linux上的原型[D].厦门:厦门大学硕士论文,2002.
  • 7ANDREW P,MOOR E.Attack Modeling for Information Security and Survivability[R].Technical Notes,Carnegie Mellon University,2001.
  • 8FREDRIK M.Security Analysis of an Information System Using an Attack Tree-based Methodology[D].Chalmers University of Technology,2000.
  • 9JOHN S,MABEN R.Intrusion Detection with Support Vector Machines and Generative Models[R].Technical Research Report,University of Maryland,2002.
  • 10Creating Secure Systems through Attack Tree Modeling[R].Resources Red Teaming Articles and Papers,Amenaza Technologies Limited.2003.

二级参考文献33

  • 1Jou Yfrank,Rome Lab USA Tech Rep:CDRL A005 1997
  • 2Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996
  • 3Longley D. , Shain M. , Caelli W.. Information Security: Dictionary of Concepts, Standards and Terms. New York: Macmillan, 1992
  • 4Beizer B.. Software Testing Techniques. 2nd edition. International Thomson Computer Press, 1990
  • 5Farmer D. , Spafford E. H.. The COPS security checker system. Purdue University, West Lafayette: Technical Report,Coast TR 94-01, CSD-TR-993, 1990
  • 6Baldwin R. W.. Kuang: Rule-based security checking. Programming Systems Research Group, Lab for Computer Science, MIT, Massachusetts: Technical Report, 1994
  • 7Zerkle D. , Levitt K. , NetKuang: A multi-host configuration vulnerability checker. In: Proceedings of the 6th USENIX Security Symposium, San Jose, CA, 1996
  • 8Porras P. A. , Kemmerer R. A.. Penetration state transition analysis: A rule-based intrusion detection approach. In: Proceedings of the Eighth Annual Computer Security Applications Conference, 1992, 220~229
  • 9Ilgun K.. USTAT: A real-time intrusion detection system for UNIX. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 16
  • 10Jensen K.. Colored petri nets: Basic concepts, analysis methods and practical use. vol. 1. 2nd edition. Berlin, Germany:Springer-Verlag, 1997

共引文献157

同被引文献358

引证文献54

二级引证文献285

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部