期刊文献+

基于攻击图的渗透测试方案自动生成方法 被引量:12

Automatic generation method for penetration test programs based on attack graph
下载PDF
导出
摘要 为满足网络安全管理需要,提出一种新的渗透测试方案自动生成方法。该方法利用被测试目标网络脆弱点间的逻辑关系,结合原子攻击知识库,通过前向广度优先搜索策略产生渗透攻击图,然后深度优先遍历渗透攻击图生成渗透测试方案,并基于该方法设计实现渗透测试预案自动生成原型系统。实例表明该方法能够有效生成可行的渗透测试方案。 In order to fulfil the need for network security management a new automatic generation method of penetration test programs was proposed in this paper.The penetration attack graph was set up with the inference relation of the vulnerabilities in the target network through the forward breadth-first search strategy which combined knowledge of atomic attack.The system produced penetration test programs through reverse depth-first traversal attack graph.A prototype of penetration test programs automatic generating system was designed and implemented on the basis of this method.The illustration indicates that this method can effectively set up the penetration test programs which provide a useful reference for network security analysis.
出处 《计算机应用》 CSCD 北大核心 2010年第8期2146-2150,共5页 journal of Computer Applications
关键词 渗透测试 攻击图 原子攻击 攻击推理 网络安全 penetration testing attack graph atomic attack attack reasoning network security
  • 相关文献

参考文献7

二级参考文献16

  • 1张继业,谢小权.基于攻击图的渗透测试模型的设计[J].计算机工程与设计,2005,26(6):1516-1518. 被引量:12
  • 2McDermott E Attack Net Penetration Testing[C]//Proceedings of the 2000 Workshop on New Security Paradigms. New York, USA: ACM Press, 2000.
  • 3汪立东.[D].哈尔滨工业大学,2002.
  • 4ASLAM T, KRSUL I, SPAFFORD E H. Use of a taxonomy of security faults[A]. The 19th National Information System Security Conference [C]. Baltimore, Maryland, 1996. 22-25.
  • 5KRSUL I V. Software Vulnerability Analysis[D]. Purdue University, West Lafayette, USA, 1998.
  • 6BISHOP M, BAILEY D. A Critical Analysis of Vulnerability Taxonomies[R]. Technical Report CSE-96-11, Department of Computer Science, University of California, Davis, 1996.
  • 7KNIGHT E, HARTLEY B V. Is your network inviting an attack[J]. Internet Security Advisor, 2000(5/6): 2-5.
  • 8JIWNANI K, ZELKOWITZ M. Maintaining software with a security perspective[A]. ICSM'02[C]. Montréal, 2002. 194-203.
  • 9GLASS R L, VESSEY I. Contemporary application-domain taxonomies[J]. IEEE Software, 1995, 12 (4): 63-76.
  • 10LONGSTAFF T. Update: CERT/CC vulnerability knowledgebase[A]. Technical Presentation at a DARPA Workshop[C]. Savannah, Georgia, 1997.

共引文献50

同被引文献94

引证文献12

二级引证文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部