期刊文献+

基于Petri网的网络攻击流模型研究 被引量:3

Research on Network Attack Flow Model Based on Petri Net
下载PDF
导出
摘要 针对网络攻击的智能组织实施问题,提出一种攻击流的概念,选用Petri网作为工具,对网络攻击流进行建模。在此基础上,对3种基本网络攻击流模型进行分析,并结合IP欺骗攻击实例,分析其在IP欺骗攻击中的具体应用及其实现方式。实验结果表明,该模型既利于攻击者构建网络攻击方案,又能被计算机解析并组织实施网络攻击。 Aiming at the issue of organization and implementation of intelligent network attack problem, this paper presents the concept of attack flow and uses Petri nets as a tool to model the flow of network attacks. On the basis, this paper analyses three kinds of basic network attack flow model. Based on the model, this paper gives an example of IP spoofing and analyses the specific application of the model and its implementation method in the IP spoofing attacks to show that the model is not only beneficial for the attacker to build network attack programs, but also helpful for the computer to analyse model and organize network attacks.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第4期158-160,177,共4页 Computer Engineering
关键词 网络攻击流 PETRI网建模 智能网络攻击 network attack flow modeling with Petri net intelligent network attack
  • 相关文献

参考文献5

二级参考文献10

  • 1史美林,清华大学学报,1998年,38卷,增1期,30页
  • 2Wu Shangguang,ProcInternational Conference on Com municationTechnology,1996年,187页
  • 3Aalst W,Hofstede A.Verification of Workflow Task Structures:A Petri-net-based Approach[R].Germany:Institut AIFB,University Karlsruhe,1998.
  • 4Aalst W.Workflow Verification:Finding Control-Flow Errors Using Petri-net-based Techniques[M].Springer-Verlag,2000:161-183.
  • 5Sadiq W,Orlowska M.Applying Graph Reduction Techniques for Indentifying Structural Conflicts in Process Models[C]//Proceedings of the 11th International Conference on Advanced Information Systems Engineering.1999:195-209.
  • 6Desel J,Esparza J.Free Choice Petri Nets[M].Cambridge:Cambridge University Press,1995:135-169.
  • 7Aaslst W,Hee K.Workflow Management:Models,Methods and Systems[M].MIT Press,2002.
  • 8史美林,杨光信.一个协同设计支撑系统原型——CoDesign[J].清华大学学报(自然科学版),1998,38(S1):33-38. 被引量:19
  • 9范玉顺,吴澄.工作流管理技术研究与产品现状及发展趋势[J].计算机集成制造系统-CIMS,2000,6(1):1-7. 被引量:208
  • 10李建强,范玉顺.基于Petri网化简方法的工作流模型验证[J].信息与控制,2001,30(6):492-497. 被引量:44

共引文献54

同被引文献23

  • 1苘大鹏,张冰,周渊,杨武,杨永田.一种深度优先的攻击图生成方法[J].吉林大学学报(工学版),2009,39(2):446-452. 被引量:23
  • 2刘聪,徐国华.基于Petri网的ERP实施应用研究[J].现代电子技术,2006,29(3):66-67. 被引量:2
  • 3孙亮,李东,张涛.网络攻击图的自动生成[J].计算机应用研究,2006,23(3):119-122. 被引量:13
  • 4冯萍慧,连一峰,戴英侠,李闻,张颖君.面向网络系统的脆弱性利用成本估算模型[J].计算机学报,2006,29(8):1375-1382. 被引量:28
  • 5王燕,李晓华.基于Petri网的入侵检测模型研究[J].现代电子技术,2007,30(12):130-132. 被引量:3
  • 6Ritchey R W,Ammann P.Using Model Checking to Analyze Network Vulnerabilities[C]//Proc.of the IEEE Symp.on Security and Privacy.Oakland,California,USA:[s.n.],2001.
  • 7Ou Xinming,Boyer W F.A Scalable Approach to Attack Graph Generation[C]//Proc.of the 13th ACM Conf.on Computer and Communications Security.[S.l.]: ACM Press,2006.
  • 8Jajodia S,Noel S.Topological Analysis of Network Attack Vul- nerability[M].Dordrecht,Netherlands: Kluwer Academic Publisher,2003.
  • 9Ammann P,Wijesekera D,Kaushik S.Scalable,Graph-based Net- work Vulnerability Analysis[C]//Proc.of the 9th ACM Conf.on Computer and Communications Security.[S.l.]: ACM Press,2002.
  • 10Dawkins J,Hale J.A Systematic Approach to Multistage Network Attack Analysis[C]//Proc.of the 2nd IEEE Int’l Information Assurance Workshop.Charlotte,USA:[s.n.],2004.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部