期刊文献+

基于AEGM的网络攻击渗透测试预案生成系统 被引量:3

Network attack penetration test plan generation system based on AEGM
下载PDF
导出
摘要 为满足网络安全管理需要,从入侵者角度出发,提出一种面向渗透测试的攻击事件图模型AEGM,并设计实现了一个网络攻击渗透测试预案生成系统。该系统以原子攻击知识库的构建及应用为前提,综合分析了从被测试目标网络脆弱点间的关联衍生出的攻击事件间的逻辑关系。利用前向广度优先搜索策略构建AEGM模型,产生渗透测试方案集,并以成功概率进行最优方案度量。实验结果表明,该方法能够有效生成渗透测试方案集,为网络安全的测试和分析提供有益参考。 An attack graph model AEGM based on penetration test is proposed from the perspective of the intruder,and a network pene-tration test plan generation system is designed and implemented.First of all,the system builds the knowledge basis of the atomic attacks,and then makes a comprehensive analysis of the logical relationship between the attacks which derived from the association of the vulnera-bilities in the target network.The system uses the forward breadth-first search strategy to construct the AEGM and results in penetration testing program sets which are measured by their success probability.Experiments show that this method can produce penetration test pro-gram sets successfully and provide a useful reference for network security testing and analysis.
出处 《计算机工程与设计》 CSCD 北大核心 2011年第4期1254-1259,共6页 Computer Engineering and Design
关键词 渗透测试 攻击图模型 原子攻击 网络安全 penetration test attack graph model atomic attack network security
  • 相关文献

参考文献10

  • 1张继业,谢小权.基于攻击图的渗透测试模型的设计[J].计算机工程与设计,2005,26(6):1516-1518. 被引量:12
  • 2杨涛,郭义喜,张弘.有色Petri网在渗透测试中的应用[J].计算机工程,2009,35(1):156-158. 被引量:7
  • 3Li W, Vaughn R. An approach to model network exploitations using exploitation graphs[C].San Diego, California:Proceedings of the Spring Simulation Multiconference on Military, Govern- ment, and Aerospace Simulation Symposium,2005:237-244.
  • 4Li W, Vaughn R.Building compact exploitation graphs for a clus- ter computing environment[C].Proceedings of the 6th IEEE In- formation Assurance Workshop. New York: IEEE SMC, IEEE Computer Society and National Security Agency,2005:50-57.
  • 5Ammann P, Wijesekera D,Kaushik S.Scalable, graph-based net-work vulnerability analysis [C]. Proceedings of the 9th ACMConference on Computer and Communications Security. Was-hington DC:ACM,2002:217-224.
  • 6李昀,李伟华.基于UML的攻击模式研究[J].计算机工程与应用,2003,39(3):8-10. 被引量:4
  • 7冷德辉,陈文革.网络安全测评和风险评估[J].广东通信技术,2001,21(7):11-16. 被引量:7
  • 8Tidwell T, Larson R,Fitch K,et al.Modeling Intemet attacks[C].Proceedings of the IEEE Workshop on Information Assuranceand Security.West Point, NY:United States Military Academy,2001:54-59.
  • 9Rumbaugh J, Jacobson I, Booch G. The unified modeling lan-guage user guide [M]. Addison Wesley Longman Inc, PearsonEducation,1999:3-4.
  • 10Schneier B.Attack trees: modeling security threats[J].Dr Dobb'sJournal, 1999,12(24):21-29.

二级参考文献14

  • 1张继业,谢小权.基于攻击图的渗透测试模型的设计[J].计算机工程与设计,2005,26(6):1516-1518. 被引量:12
  • 2McDermott E Attack Net Penetration Testing[C]//Proceedings of the 2000 Workshop on New Security Paradigms. New York, USA: ACM Press, 2000.
  • 3[1]Rumbaugh J,Jacobson I,Booch G.The Unified Modeling Language User Guide[M].Addison Wesley Longman,Inc, 1999:3~4
  • 4[2]Rumbaugh J,Jacobson I,Booeh G.The Unified Modeling LanguageReference Manual[M].Addison Wesley Longman,Inc,1999:178~180
  • 5[3]Comer D E,Stevens D L.Internetworking with TCP/IP Volume I:Principles,Protocols,and Architecture[M].Third Edition,Prentice-Hall International, Inc, 1995:150~167
  • 6[4]Comer D E,Stevens D L.Internetworking with TCP/IP Volume Ⅱ:
  • 7Swiler L P, Philips C, Gaylor T. A graph-based newtwork-vulnerability analysis system[R]. Livermore, California, USA: Sandia National Laboratories, 1998.
  • 8Sheyner O, Haines J, Jha S, et al. Automated generation and analysis of attack graphs[C]. IEEE Symposium on Security and Privacy,2002.
  • 9Kurtz G, Prosise C. Penetration testing exposed[J]. Information Security, 2000, (9).
  • 10Herzog P. Open-source security testing methodology manual[EB/OL]. Http://isecom.securentled.com/osstmm.es.2.1.pdf.

共引文献25

同被引文献14

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部