期刊文献+

基于MLL-AT的网络攻击建模方法研究 被引量:5

Research on establishing network intrusion modeling based on MLL-AT
下载PDF
导出
摘要 研究了攻击树建模攻击的方法,主要研究目的是如何有效地用攻击树建模和表示多阶段网络攻击。对传统攻击树进行扩充和改进,重新定义了攻击节点,量化了叶子节点的攻击风险,提出了一种用MLL-AT(多级分层攻击树)建模攻击的思想和方法,并给出了一种基于攻击树的MLL-ATDL攻击描述语言。改进后的攻击树能更准确地建模攻击,尤其是表示多阶段网络攻击,并可以用于评估系统风险,区分不同攻击序列对系统的不同安全威胁程度。 The method of modeling attack using attack tree was researched.The main research goal was how to effectively use the attack tree model and denote the multi-stage network attacks.Traditional attack tree was expanded and improved.Nodes of attack tree were redefined,and attack risk of leaf node was quantified.Then the mentality and method for estab-lishing MLL-AT(multi-level layer attack tree) were proposed.Based on the given attack tree,the MLL-ATDL(mul-ti-level layer attack tree description language) attack description language was given.The improved attack tree can model the attacks more accurately,in particular the multi-stage network attacks.And it can also be used for appraising system risk,distinguishing the different degrees of system security threats caused by different attack sequences.
出处 《通信学报》 EI CSCD 北大核心 2011年第3期115-124,共10页 Journal on Communications
基金 国家高技术研究发展计划("863"计划)基金资助项目(2007AA01Z409) 国家自然科学基金资助项目(60473093) 江苏省高技术研究计划基金资助项目(BG2004030) 江苏省科技支撑计划基金资助项目(BE2008124) 江苏省高校自然科学研究项目(10KJB520020)~~
关键词 网络安全 网络攻击 攻击建模 攻击树 攻击描述语言 network security network attack intrusion modeling attack tree attack description language
  • 相关文献

参考文献15

  • 1杨彦,黄皓.基于攻击树的木马检测方法[J].计算机工程与设计,2008,29(11):2711-2714. 被引量:15
  • 2EDGE K S, DALTON G C, RAINES R A, et al. Using attack and protection trees to analyze threats and defenses to homeland Security[A]. MILCOM, IEEE[C]. Los Alamitos, 2006.1-7.
  • 3沈超,崔金生,刘晓然.基于增强攻击树的复杂攻击分析与防御[J].通信技术,2009,42(4):145-147. 被引量:1
  • 4HELMER G, WONG J, SLAGELL M, et al. A software fault tree approach to requirements analysis of an intrusion detection system[A]. Symposium on Requirements Engineering for Information Security[C] Indianapolis, USA, 2001.
  • 5SCHNEIER B. Attack trees: modeling security threats[J]. Dr. Dobb's Journal of Software Tools, 1999,24(12): 21-29.
  • 6段友祥,王海峰.基于改进攻击树的网络攻击模式形式化研究[J].中国石油大学学报(自然科学版),2007,31(1):144-147. 被引量:6
  • 7袁艺,王轶骏,薛质.基于攻击树的协同入侵攻击建模[J].信息安全与通信保密,2006,28(3):55-57. 被引量:3
  • 8SEYIT A C, BULENT Y. Modeling and detection of complex attacks[A]. 3th International Conference on Security and Privacy in Communication Networks[C]. Nice, France, 2007. 234-243.
  • 9李跃志,崔金生,刘晓然.基于攻击树的自动攻击模型研究[J].中国新通信,2009,11(19):62-64. 被引量:2
  • 10EVANS S, WALLER J. Risk-based security engineering through the eyes of the adversary[A]. Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop[C]. New York, 2005. 158-165.

二级参考文献47

共引文献39

同被引文献72

引证文献5

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部