期刊文献+

攻击图展示技术研究 被引量:1

Visual Technology of Attack Graph
下载PDF
导出
摘要 攻击图技术是一种基于模型的网络脆弱性评估方法。它通过对目标网络建模,以攻击规则对攻击者建模,然后根据二者之间的相互作用关系产生攻击图,展示目标网络内各个脆弱性之间的关系、脆弱性与网络安全配置之间的关系。早期的攻击图都是采用手工生成,速度慢效果差。为了方便研究人员使用攻击图分析目标网络安全状况,对攻击图的自动展示技术进行了研究。通过选用成熟的软件和设计合适的转换方法对攻击图进行解析,生成简洁清楚的攻击图,提高了攻击图的效能。 Attack graph technology is a method of the model-based evaluation for network vulnerabilities. Through modeling the target network and modeling the attacker with attack rules, it gives attack graphs according to their relationship to reveal the relation of all the vulnerabilities in object network, and the relation between vulnerability and network security configuration. Early attack graph was produced by hand, which had a slow speed and dissatisfaction effect. In order to give facility for researchers to analyze the security condition of target network, a research is given to the visual technology of attack graph. Through the mature software and appropriate conversion technique to parse the attack graphs, the concision and clear attack graphs are generated and the efficiency of the attack graphs is improved.
作者 苏华安 张怡
出处 《现代电子技术》 2010年第19期94-96,100,共4页 Modern Electronics Technique
基金 国家863计划项目(2009AA01Z432)
关键词 攻击图 展示技术 网络脆弱性评估 网络建模 attack graph visual technology evaluation for network vulnerability network modeling
  • 相关文献

参考文献1

二级参考文献6

  • 1Li Wei. An Approach to Graph-Based Modeling of Network Exploitations:[Ph D Dissertation[ D]. Mississippi State, Mississippi:Department of Computer Science and Engineering, Mississippi State University, 2005.
  • 2Ammann P, Wijesekera D, Kaushik S. Scalable, Graph- Based Network Vulnerability Analysis[C]//Proc of the 9thACM Conf on Computer and Communications Security, 2002: 217-224.
  • 3Jaiodia S, Noel S, O'Berry B. Topological Analysis of Network Attack Vulnerability [M] ff Kumar V, Srivastava J, Lazarevic A, eds. Managing Cyber Threats: Issues, Approaches and Challenges. Boston: Kluwer Academic Publisher, 2003 : 3-4.
  • 4Sheyner O, Haines J, Jha S, et al. Automated Generation and Analysis of Attack Graphs[C]//Proc of 2002 IEEE Syrup on Security and Privacy, 2002 : 264-265.
  • 5Ou Xinming, Boyer W F, MeQueen M A. A Scalable Approach to Attack Graph Generation[C] //Proc of the 13th ACM Conf on Computer and Communications Security, 2006:336-345.
  • 6Ou Xinming. A Logic-Programming Approach to Network Security Analysis : [Ph D Dessertation] [D]. Princeton.. Princeton University, 2005.

共引文献4

同被引文献5

  • 1Computer Technology Associates. Information security: network assessment white paper [EB/OL]. [2002-06-14]. http://www.cta. com/content/docs/Net_Ass.
  • 2SAHA D. Extending logical attack graph for efficient vulnerabili- ty analysis [C]// Proceedings of 15th ACM Conference on Com- puter and Comm. Security. New York, USA: ACM, 2008: 63-74.
  • 3DEWRI R, POOLSAPPASITN, RAY I, et al. Optimal security hardening using multi-objective optimization on attack tree models of networks [C]// Proc. 14th ACM Conf. Computer and Comm. Security. [S.1.]: ACM, 2007: 204-213.
  • 4JAJODIA Sushil, NOEL Steven. Topological vulnerability analy- sis [J]. Advances in Information Security, 2010, 46(4). 139-154.
  • 5SCHIFFMAN M. Common vulnerability scoring system (CVSS) [EB/OL]. [2007-06-20]. http ://www.first.org/cvss/cvss-guide.

引证文献1

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部