期刊文献+

一种高效的攻击图生成方法研究 被引量:2

An Effective Method of Generating Attack Graphs
下载PDF
导出
摘要 提出了一种适用于大规模复杂网络系统的攻击图生成算法,从主机间可达性、安全防护系统、主机系统和网络服务四个层面对目标网络进行建模,提出了主机间可达性参数的自动获取技术,从而有效支持了大规模目标网络建模的自动化,通过实验分析证明,本算法能够适合全面分析网络安全性和攻击者可能采取的行为方式. This paper proposes a kind of attack graph generation algorithm for large-scale complex network system. Model the target network in four levels: hosts' accessibility, security systems, host systems and network services, and propose an automatic gain technology for hosts' accessibility parameters. This algorithm supports effectively the modeling automatically of large-scale target network. From the experiment results we can see, this algorithm can satisfy analyzing network security and the action of attacker roundly.
出处 《微电子学与计算机》 CSCD 北大核心 2011年第4期13-17,共5页 Microelectronics & Computer
基金 国家"八六三"计划项目(2009AA01Z432)
关键词 大规模复杂网络 主机间可达性 安全防护系统 主机攻击图 正向BFS搜索策略 laNe-scale network hosts' accessibility security system hosts' attack graph forward BFS search strategy
  • 相关文献

参考文献7

  • 1程铃.MANET入侵检测技术的研究[J].微电子学与计算机,2010,27(6):57-59. 被引量:6
  • 2孙强.基于定量安全风险评估模型的网络安全管理平台[J].微电子学与计算机,2010,27(5):70-73. 被引量:10
  • 3Swiler L P, Phillips C, Ellis D, et al. Computer-attack graph generation tool[C].//Proceedings DARPA Information Survivability Conference and Exposition (DISCEX II'01). Anaheim, California: IEEE Computer So eiety, 2001: 307-321.
  • 4Swiler L P, Phillips C, Gaylor T. A graph-based network-vulnerability analysis system, SAND97-3010/1[R]. New Mexico and Livermore, California: Sandia National Laboratories, Albuquerque, 1998.
  • 5Sushil Jajodia, StevenNoel. Topological vulnerability analysis, center for secure information systems[J]. Computer Science, 2010,46(4):139-154.
  • 6Xinming Ou, Wayne F Boyer. A scalable approach to attack graph generation[C].// Proceedings of the 13th ACM conference on Computer and communications security, USA: ACM, 2006:336-345.
  • 7Xinming Ou. A logic-programming approach to network security analysis[D]. Princeton:Princeton Univer- sity, 2005.

二级参考文献12

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2孙强,郭江鸿,王慧.基于消息通信的安全管理系统的设计与实现[J].计算机工程与应用,2006,42(10):140-143. 被引量:6
  • 3高寅生.安全漏洞库设计与实现[J].微电子学与计算机,2007,24(3):99-101. 被引量:9
  • 4解争龙.基于无线Ad Hoc网络的入侵检测系统体系结构研究[J].微电子学与计算机,2007,24(5):103-105. 被引量:3
  • 5李平均,刘权,李天.基于主被动结合的网络入侵检测系统的设计与实现[J].微电子学与计算机,2007,24(7):50-52. 被引量:5
  • 6ISO/IEC TR13335 - 1 Guide - lines for the management of IT security, partl : concepts and models for IT security [EB/OL]. [2004 - 11 - 19]. http://www, din. de/ni/ sc27.
  • 7Kachirski Q,Guha R.Effective intrusion detection using multiple sensors in wireless Ad Hoc networks[C]//Proc.the 36th Annual Hawaii International Conference on System Sciences(HICSS' 03).Hawaii,USA,2003:57.
  • 8Huang Y,Lee W.A cooperative intrusion detection system for Ad Hoc networks[C]//Proc.the ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN'03).Fairfax,VA,USA,2003:135-147.
  • 9Sterne D,Balasubramanyam P,Carman B,et al.A general cooperative intrusion detection architecture for MANETs[C]//Proc.the 3rd IFFF.International Workshop on Information Assurance(IWIA'05).University of Maryland,USA.2005:57-70.
  • 10Sun B,Wu K,Pooch U W.Alert aggregation in mobile Ad Hoc networks[C]//Proc.the 2003 ACM Workshop on Wireless Security in Conjuction with the 9th Annual International Conference on Mobile Computing and Networking.San Diego,California,USA,2003:69-78.

共引文献14

同被引文献12

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部