期刊文献+

网络攻击图的构造及应用 被引量:1

The Construction and Application of Network Attack Graph
下载PDF
导出
摘要 随着计算机网络的不断发展,各种针对计算机网络的攻击也越来越多。如何对一个网络进行安全性检查,即对该网络环境中可能发生的攻击进行建模,是广大安全人员必须考虑的重要问题。在众多的网络攻击建模方法中,网络攻击图以其形象化的特点而被广泛应用。在此背景下,本文首先介绍了攻击图的构造方法,在此基础上进一步描述其在网络安全领域的应用,最后展望了攻击图领域未来的研究重点。 With the development of computer networks, the attacks with respect to them are increasing explosively. It is a very important problem for security testers to test the security situation of a specific network (i.e., to use a method to model all the possible attacks within the environment). Of all the modeling methods, the Network Attack Graph is widely used because of its visual intuition. Under this circumstance, this paper firstly introduces the construction methods of the Network Attack Graph, then describes its application in the network security, and lastly previews some research directions of the Network Attack Graph.
出处 《China Communications》 SCIE CSCD 2009年第4期13-16,共4页 中国通信(英文版)
关键词 网络攻击图 网络攻击 渗透测试 network attack graph network attack penetration test
  • 相关文献

参考文献8

  • 1C.A.Phillips,,L.P.Swiler.A Graph-Based System for Network Vulnerability Analysis[].the ACM Proceedings from theNew Security Paradigms Workshop.
  • 2P.Ammann,,D.Wijesekera,,S.Kaushik."Scalable,Graph-Based Network Vulnerability Analysis,"[].Proceedings of the th ACM Conference on Computer and Communications Security.2002
  • 3Richard Lippmann,Kyle Ingols,Chris Scott,Keith Piwowarski,Kendra Kratkiewicz,Michael Artz,Robert Cunningham.Evaluating and Strengthening Enterprise Network Security Using Attack Graphs[].MIT Lincoln Laboratory Report.2005
  • 4Xinming Ou,Wayne F.Boyer,,Miles A.McQueen.A Scalable Approach to Attack Graph Generation[].th ACM Conference on Computer and Communications Security(CCS).2006
  • 5S.Jha,,O.Sheyner,,J.M.Wing.Two Formal Analyses of Attack Graphs[].Proceedings of theth IEEE Computer Security Foundations Workshop.2002
  • 6Kyle Ingols,Richard Lippmann,Keith Piwowarski.Practical Attack Graph Generation for Network Defense[].Proceedings of thend Annual Computer Security Applications Conference(ACSAC‘).2006
  • 7O.Sheyner,J.Haines,S.Jha,R.Lippmann,J.Wing.Automated generation and analysis of attack graphs[].Proceedings of the IEEE Symposium on Security and Privacy.2002
  • 8Swiler,L. P.,Phillips,C.,Ellis,D.Computer-Attack Graph Generation Tool[].Proceedings of the DARPA Inf Surviv Conf and Expos Los Alamos USA.2001

同被引文献11

  • 1STOLL C.The Cuckoo’’s Egg. . 1989
  • 2SPITZNER L.Dynamic Honeypots[OL]. http: / /www.securi- tyfocus.com/infocus/1731 . 2003
  • 3HECKER C,NANCE KL,HAY B.Dynamic Honeypot Con- struction. Proceedings of the 10th Colloquium for Infor- mation Systems Security Education: June 5-8,2006 . 2006
  • 4KUWATLY I,SRAJ M,MASRI ZA.A Dynamic Honeypot Design for Intrusion Detection. Proceedings of the 2004 IEEE International Conference on Pervasive Services: July 19- 23,2004 . 2004
  • 5KHATTAB SM,SANGPACHATANARUK C,MOSSE D,et al.Roaming Honeypots for Mitigating Service-level Denial of Service Attacks. Proceedings of the 24th International Conference on Distributed Computing Systems: March 24-26, 2004 . 2004
  • 6SHI L,,LI J.Research on Synchronization Strategies for Net- work Confrontation. Proceedings of the 6th International Conference on Wireless Communications Networking and Mo- bile Computing: . 2010
  • 7PRASAD R,ABRAHAM A.Hybrid Framework for Behav- ioral Prediction of Network Attack Using Honeypot and Dy- namic Rule Creation with Different Context for Dynamic Blacklisting. Proceedings of the 2nd International Con- ference on Communication Software and Network: February 26-28,2010 . 2010
  • 8JONES J.Distributed Denial of Service Attacks: Defenses,a Special Publication. . 2000
  • 9Sardana, A,Joshi, R.An auto-responsive honeypot architecture for dynamicresource allocation and QoS adaptation in DDoS attacked networks. Computer Communications . 2009
  • 10ANTONATOS S,MARKATOS E P,ANAGNOSTAKIS K G.Honey@home:A new approach to largescale threat monitoring. Pro-ceedings of the2007ACM Workshop on Recurring Malcode(WORM’07) . 2007

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部