期刊文献+

网络攻击效果在线评估模型与算法研究 被引量:6

Research of Online Evaluation Model and Algorithm for Network Attack Effect
下载PDF
导出
摘要 为了顺利实现预定的攻击目标,在线评估攻击效果并制定适当的攻击策略都是非常重要的。本文讨论了网络攻击效果与目标网络系统安全性之间的关系,提了一种基于网络安全性改变量的攻击效果定义方法;重点研究了网络攻击效果在线评估的评估模型和评估算法;提出了网络攻击效果的评价准则和评估指标体系;设计并给出了网络攻击效果在线评估系统的框架模型;详细讨论了网络攻击效果在线评估的评估算法、状态图生成算法、攻击效果预测算法和攻击方案决策算法。 In order to achieving the network attack object perfectly, it's very important to evaluating the attack effect in real time and making proper attack strategy. The relationship between attack effect and network security property is analyzed. A definition of the network attack effect based on the change of network security property is given. The online evaluation model and evaluation algorithm for network attack effect are mainly studied in this paper. The evaluation rule and evaluation metrics are brought forward. The framework and design method of the network attack effect online evaluation system are described. The evaluation algorithm, attack status graph generating algorithm, attack effect predicting algorithm and attack scenario decision-making algorithm are discussed carefully. Finally, some problems which should be researched thoroughly in the future are pointed out.
出处 《计算机科学》 CSCD 北大核心 2007年第5期72-74,103,共4页 Computer Science
基金 国家自然科学基金项目(60372039)
关键词 网络攻击 攻击效果 在线评估 状态图 Network attack, Attack effect, Online evaluating, Status graph
  • 相关文献

参考文献7

  • 1Lala C,Panda B.Evaluating Damage from Cyber Attacks:A Model and Analysis[J].IEEE Transactions on Systems,Man and Cybernetics-Part.A:Systems and Humans,JULY,2001,31(4)
  • 2Liu Peng,Zang Wanyu,Yu Meng.Incentive-based Modeling and Inference of Attacker Intent,Objectives,and Strategies[J].ACM Transactions on Information and System Security,2005,8 (1):78~118
  • 3Menasch'ea D S,Figueiredob D R,de Souza e Silvaa E.An evolutionary game-theoretic approach to congestion control[J].Performance Evaluation,2005,62:295~312
  • 4Gregg M,Kim D.Inside Network Security Assessment:Guarding your IT Infrastructure[M].Sams,2005
  • 5冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 6林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 7刘进,王永杰,张义荣,鲜明,肖顺平.层次分析法在网络攻击效果评估中的应用[J].计算机应用研究,2005,22(3):113-115. 被引量:25

二级参考文献66

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 2鲜明 等.国家自然基金报告[R].长沙:国防科技大学,2003.7-33.
  • 3胡影.[D].长沙:国防科技大学,2003,5-31.
  • 4Satty T L. How to Make a Decision:The Analytic Hierarchy Process[J]. European Journal of Operational Research, 1990,1(48):9-26.
  • 5Miksell S, Nainis W S, James H M. Security Vulnerability Assessment Tools for Internet Applications[R]. White Paper, Information Technology Support Center, 2001.
  • 6United States General Accounting Office, Accounting and Information Management Division. Information Security Risk Assessment[Z]. Augest 1999.
  • 7National Institute of Standards and Technology. Special Publications 800-30, Risk Management Guide(DRAFT)[Z]. June 2001.
  • 8BUTLER S A, FISCHBECK P. Multi-Attribute Risk Assessment, Technical Report CMD-CS-01-169[R]. December 2001.
  • 9BUTLER S A. Security Attribute Evaluation Method: A Cost-Benefit Approach[Z]. Computer Science. Department, 2001.
  • 10PELTIER T R. Information Security Risk Analysis[Z]. Rothstein Associates Inc, 2001.

共引文献415

同被引文献50

引证文献6

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部