期刊文献+

基于随机Petri网模型的远程口令破解和防御分析

Analyse of Remote Password Crack and Defence Based the Stochastic Petri Net
下载PDF
导出
摘要 分析网络应用中基于口令的身份认证流程,指出其存在的漏洞,详细分析在帐户锁定策略下远程口令破解的过程,分析帐户锁定对口令破解的影响。使用随机Petri网建立基于系统状态变化的过程模型,利用位置中token数和弧权来模拟帐户锁定阀值和触发锁定,利用循环来模拟多次攻击和防御过程,定义3个主要参数和1个评价指标,量化分析参数和指标的关系,评价不同防御策略下攻击和防御的性能,帮助用户改善防御措施,提高网络安全性。 The paper analyzes the flow of identity authentication based password in the network application and indicates the existent leak in the flow.It analyzes particularly the process of remote password crack with the account lock policy and analyzes the account lock's effect on password crack.It founds the process model based on the system state change with the Stochastic Petri Nets.It simulates the account lock valve and touch lock off with the token's number in the place and the arc's power.It simulates many times attack and defense process with the circle.It defines three parameters and one evaluation measure.It quantitatively analyzes the relation between parameters and measure.It evaluates the performance of attack and defense under the different defence policies.It helps users to improve the defence steps and enhance the network security.
出处 《系统仿真学报》 CAS CSCD 北大核心 2008年第S2期136-139,共4页 Journal of System Simulation
基金 国家自然科学基金(90718040 60673187 60803123) 中国博士后基金(20080430040)
关键词 网络安全 远程口令破解 帐户锁定 随机PETRI网 network security remote password crack account lock stochastic petri net
  • 相关文献

参考文献2

二级参考文献55

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2Qu G.,Jayaprakash,Ramkishore M.,Hariri S.,Raghavendra C.S.A framework for network vulnerability analysis.In:Proceedings of the 1st IASTED International Conference on Communications,Internet,Information Technology (CⅡT2002),St.Thomas,Virgin Islands,USA,2002,289~298
  • 3Moore A.P.,Ellison R.J.,Linger R.C.Attack modeling for information security and survivability.Carnegie Mellon Univer sity:Technical Note CMV/SEI-2001-TH-001,2001
  • 4Jonsson E.,Olovsson T.A quantitative model of the security intrusion process based on attacker behavior.IEEE Transactions on Software Engineering,1997,23(4):235~245
  • 5Mahimkar A.,Shmatikov V.Game-based analysis of Denial-of-service prevention protocols.In:Proceedings of the IEEE Computer Security Foundations Workshop(CSFW05),Aix-en-Provence,France,2005,287~301
  • 6Xia Zheng-You,Zhang Shi-Yong.A kind of network security behavior model based on game theory.In:Proceedings of the 4th International Conference on Parallel and Distributed Computing,Applications and Technologies,PDCAT,Chengdu,China,2003,950~954
  • 7Avizenis A.,Laprie J.,Randell B.Fundamental concepts of dependability.In:Proceedings of the 3rd Information Survivability Workshop,Boston,MA,2000,7~12
  • 8Goseva-Postojanova K.,Wang F.,Wang R.,Gong F.,Vaidyanathan K.,Trivedi K.S.,Muthusamy B.Characterizing intrusion tolerant systems using a state transition model.In:Proceedings of DARPA DISCEX Ⅱ Conference,2001,Ⅱ(2):211~221
  • 9Schneier B.Secrets and Lies:Digital Security in a Networked World.New York:John Wiley & Sons,2000
  • 10Dacier M.Towards quantitative evaluation of computer secur ity[Ph.D.dissertation].Institut National Polytechnique de Toulouse,France,1994

共引文献91

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部