期刊文献+

一种基于智能规划的信息安全风险过程建模方法 被引量:4

A Planning-based Method of Risk Process Modeling for Information Security
下载PDF
导出
摘要 为了评估网络信息系统的安全风险,提出了基于智能规划的信息安全风险过程建模方法:使用规划领域的定义语言描述信息安全的风险领域和风险问题,修改后的bifrost规划引擎调用相关算法构建系统所有的渗透路径,最后通过Graphviz Toolkit接口绘制出规划渗透图表现系统安全风险过程. To evaluate the information security risk,a planning-based information security risk process modeling approach(PISRPMA)was proposed to model the risk process of Information Security.PISRPMA described risk domain and risk problem in planning domain definition language,a modified bifrost engineer reasoned all exploit paths using correlative algorithms and Graphviz Toolkit built a planning exploit graph to model the risk process.
出处 《电子学报》 EI CAS CSCD 北大核心 2008年第B12期76-80,70,共6页 Acta Electronica Sinica
关键词 智能规划 风险过程 规划领域定义语言 planning risk process planning domain definition language
  • 相关文献

参考文献11

  • 1毛撼东.基于逻辑渗透图模型的网络安全风险评估方法研究[D].长沙:国防科技大学研究生院,2008.
  • 2Ou Xin-ming. A scalable approach to attack graph generation [A]. Proceedings of the 13th ACM Conference on Computer and Communications Security[ C ]. Alexandria Virginia, USA: ACM, 2006. 336 - 345.
  • 3O Sheyner. Scenarios Graphs and Attack Graphs[ D ]. Pitts-burgh,Pennsylvania, USA: Department of Computer Science, Carnegie Mellon University, 2004.
  • 4P Ammann, D Wijesekera, S Kaushik. Scalable, graph-based network vulnerability analysis [ A ]. Proceedings of the 9th ACM Conference on Computer and Communications Security [ C]. Washington DC, USA: ACM,2002.217 - 224.
  • 5Li Wei. An approach to model network exploitations using exploitation graph[ J]. SIMULATION, 2006,82(8) : 523 - 541.
  • 6L Swiler, C Philips, D Ellis, et al. Computer-attack graph generation tool[ A]. DARPA Information Survivability Conference and Exposition Proceedings [ C ]. Anaheim, CA, USA: IEEE, 2002.307 - 321.
  • 7Lippmann R, K W Ingols. An Annotated Review of Past Papers on Attack Graphs[ R ]. Project Report [A], Lexington, Massachusetts: Lincoln Laboratory of Massachusetts Institute of Technology, 2005.
  • 8Wei Li. An Approach to Graph-Based Modeling of Network Exploitations[D] .Mississippi State: Mississippi State University,2005.
  • 9Russell,Stuart,Peter Norvig.人工智能[M].北京:人民邮电出版社,2004.
  • 10宋泾舸,查建中,陆一平.智能规划研究综述——一个面向应用的视角[J].智能系统学报,2007,2(2):18-25. 被引量:7

二级参考文献42

  • 1[11]EROL K,HENDLER J,NAU D.HTN planning:complexity and expressivity[A].In Proceedings of AAAI-94[C].Seattle,USA,1994.
  • 2[12]NAU D,AU T,ILGHAMI O,et al.SHOP2:an HTN planning system[J].JAIR,2003,20:379-404.
  • 3[13]SIMPSON R,MCCLUSKEY T,LIU D,et al.Knowledge representation in planning:a PDDL to OCLh translation[A].ISMIS2000[C].Charlotte,USA,2000.
  • 4[14]TATE A,DRABBLE B,DALTON J.O-plan:a knowledge-based planner and its application to logistics[A].Advanced Planning Technology[C].Morgan Kaufmann,1996.
  • 5[15]WILKINS D.Using the SIPE-2 planning system:a manual for version 6.0[M].SRI International Artificial Intelligence Center.Menlo Pork.California.1999.
  • 6[16]CHIEN S,RABIDEAU G.ASPEN-automated planning and scheduling for space mission operations[A].SpaceOps2000[C].Toulouse,France,2000.
  • 7[17]CESTA A,ODDI A.A representation language for domain knowledge in planning architectures[A].In Proceedings of KAW-96[C].Alberta,Canada,1996.
  • 8[18]BLUM A,FURST M.Fast planning through planning graph analysis[A].In Proceedings of IJCAI-95[C].Quebec,Canada,1995.
  • 9[19]HOFFMANNJ.FF:the fast-forward planning system[J].AI Magazine,2001,22(3):57-62.
  • 10[20]KAUTZ H,SELMAN B.Pushing the envelope:planning,propositional logic,and stochastic search[A].In Proceedings of AAAI-96[C].Portland,USA,1996.

共引文献7

同被引文献45

  • 1王珏,袁小红,石纯一,郝继刚.关于知识表示的讨论[J].计算机学报,1995,18(3):212-224. 被引量:54
  • 2穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:50
  • 3诸葛建伟,韩心慧,叶志远,邹维.基于扩展目标规划图的网络攻击规划识别算法[J].计算机学报,2006,29(8):1356-1366. 被引量:17
  • 4吴向军,姜云飞,凌应标.基于STRIPS的领域知识提取策略[J].软件学报,2007,18(3):490-504. 被引量:20
  • 5年志刚,梁式,麻芳兰,李尚平.知识表示方法研究与应用[J].计算机应用研究,2007,24(5):234-236. 被引量:61
  • 6Swanson M, et al. Security Metrics Guide for Information Technology Systems: NIST Special Publication 800-55 [ R ]. NY USA:National Institute of Standards and Technology,2003.
  • 7Mell P, Scarfone K, Romanosky S. Common vulnerability scoring system[ J]. IEEE Security & Privacy Magazine,2006,4(6) : 85 - 89.
  • 8Wang L, Tania Islam, Tao Long.An attack graph-based probabilistic security metric [ A ]. Proceedings of 22nd International Federation for Information Processing[ C]. DAS USA: Springer Berlin/Heidelberg, 2008.283 - 296.
  • 9Sushil Jajodia. Topological analysis of network attack vulnerability[ A]. Proceedings of the 2nd ACM Symposium on Informarion, Computer and Communications Security[ C] .NY USA: ACM Press, 21207.2 - 2.
  • 10P Ammann, D Wijesekera, S Kaushik. Scalable, graph-based network vulnerability analysis [ A ]. Proceedings of the 9th ACM Conference on Computer and Communications Security [C]. Washington DC USA: ACM Press,2002.217 - 224.

引证文献4

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部