期刊文献+

基于权能的黑客攻击场景建模方法

MODELING ATTACK SCENARIO WITH CAPABILITY
下载PDF
导出
摘要 攻击场景的建模和识别能够为安全管理员提供黑客攻击过程的高层视图,并为攻击响应提供更精确的决策信息。目前,攻击场景建模已经成为网络与信息安全的热点之一。黑客攻击常常需要实施多个不同性质的攻击步骤,这些攻击步骤形成了攻击场景。黑客可以通过变异、重排、替换、分布、循环等手段产生几乎无穷的不同种攻击场景以达到攻击目的。这种攻击步骤的变异性和攻击组合的多样性是攻击场景建模的难点。研究了现有的攻击场景建模方法,提出使用权能表达的需求/提供关系来建模黑客攻击场景,该方法具有同时考虑攻击变体的层次性和攻击组合的多样性优点。 Attack scenario modeling and recognizing technology can provide the security system operator(SSO) with the high-level attack views and precise decision information for response, and it has been a hot research direction in network and information security domain. In order to succeed in attacking, attackers often use different steps and various skills such as mutation, re-sequencing, substitution,distribution, looping etc. to construct almost infinite attack scenarios. The variation in attack steps and diversity in scenario constructions lead to difficulties in attack scenario modeling and recognizing. On the basis of researches of the present attack scenario modeling technologies, a new attack scenario modeling using Requires/Provides relation represented by Capability is proposed, which can take both the various attack steps and diverse scenario constructions into consideration simultaneously.
出处 《计算机应用与软件》 CSCD 北大核心 2007年第10期192-194,共3页 Computer Applications and Software
关键词 攻击场景 权能 需求/提供模型 攻击场景建模 Attack scenario Capability Requires/provides model Attack scenario modeling
  • 相关文献

参考文献7

  • 1Templeton S J,Levitt K.A requires/provides model for computer attacks.Proceedings of the 2000 workshop on New security paradigms 2001:31-38.
  • 2Debar H,Wespi A.Aggregration and Correlation of Intrusion-Detection Alerts.In Proceedings of the 4th International Symposium on Recent Advances in Intrusion detection,2001.
  • 3Ning P,Cui Y,Reeves D S.Analyzing Intensive Intrusion Alerts Via Correlation.in Porceedings of the 5th International Symposium on Recent Advances in Intrusion Detection,LNCS 2516,October 2002:74-94.
  • 4Cuppens F.Managing Alerts in a Multi-Intrusion Detection Environment.In 17th Annual Computer Security Applications Conference New-Orleans,New-Orleans,USA,December 2001.
  • 5Bruce Schneier Attack Trees Dr.Dobb's Journal,December 1999.
  • 6Moore A P,Ellison R J,Linger R C.Attack modeling for information security and survivability.Software Engineering Institute Technical Report CMU/SEI-2001-TN-001,March 2001.〈http://www.cert.org/archive/pdf/01tn001.pdf〉.
  • 7Steven Cheung Ulf Lindqvist Martin W.Fong Modeling Multistep Cyber Attacks for Scenario Recognition In proceedings of the Third DARPA Information Survivability Conference and Exposition,Washington,D.C.,April 22-24,2003,1:284-292.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部