期刊文献+

基于二叉决策图的网络可达性计算

Binary decision diagram-based network reachability computing
下载PDF
导出
摘要 针对现有攻击图生成方法中普遍通过网络扫描获得网络可达性信息存在信息不完整、耗时长、产生网络干扰等不足,提出一种基于二叉决策图的网络可达性计算方法。该方法利用二叉决策图建模防火墙规则,通过高效的集合运算计算网络可达性。真实环境检测和模拟实验均表明该方法具有精确、耗时短、无网络干扰等优点,适用于大规模网络可达性的计算,推动了攻击图在大规模网络中的应用。 Almost all of the available attack graph generating tools get network reachability through network vulnerability scanning.There are some flaws by scanning, such as incomplete information, time consuming, and side-effect on the network. It proposes a novel algorithm to compute network reachability based on binary decision diagram. The algorithm represents firewall rules by corresponding binary decision diagram, computes the reachability by efficient set operations.The algorithm is experimented and used in operational network and simulated network. The result shows that it is accurate, it consumes less time, has no side-effect on the network, and scales well, so it suits for the large-scale network reachability computing and promotes the application of attack graph in large scale network.
出处 《计算机工程与应用》 CSCD 2012年第4期74-76,共3页 Computer Engineering and Applications
基金 国家科技支撑计划资助项目(No.2009BAH52B06) 中国科学院知识创新工程重要方向基金资助项目(No.YYYJ-1013) 中国科学院研发实验服务基地测试基金项目(No.201004)
关键词 攻击图 网络扫描 网络可达性 二叉决策图 大规模网络 attack graph network scanning network reachability binary decision diagram large-scale network
  • 相关文献

参考文献6

  • 1Ingols K, Chu M,Lippmann R, et al.Modeling modem network attacks and countermeasures using attack graphs[C]//Proceed- ings of the 2009 Annual Computer Security Applications Con- ference.Washington,DC:IEEE Computer Society,2009.
  • 2宋舜宏,陆余良,夏阳,袁桓.基于贪心策略的网络攻击图生成方法[J].计算机工程,2011,37(2):126-128. 被引量:10
  • 3Noel S,Elder M,Jajodia S,et al.Advances in topological vulner- ability analysis[C]//Proceedings of the Cybersecurity Applica- tions & Technology Conference For Homeland Security.Washing- ton, DC: IEEE Computer Society, 2009.
  • 4Ou X M, Boyer W F.A scalable approach to attack graph gener- ation[C]//Proceedings of the 13th ACM Conference on Comput- er and Communications Security.New York:ACM Press,2006.
  • 5赵芳芳,陈秀真,李建华.基于权限提升的网络攻击图生成方法[J].计算机工程,2008,34(23):158-160. 被引量:13
  • 6Lind-Nielsen J, Cohen H.BuDDy-2.4:a binary decision diagram library[EB/OL]. [2011-5-8].http://sourceforge.net/proj ects/buddy/.

二级参考文献11

  • 1王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:55
  • 2Sheyner O, Wing J M. Tools for Generating and Analyzing Attack Graphs[C]//Proceedings of Workshop on Formal Methods for Components and Objects. Tehran, Iran: [s. n.], 2004.
  • 3Ammann P, Wijesekera D, Kaushik S. Scalable, Graph-based Network Vulnerability Analysis[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2002.
  • 4Ou Xinming, Govindavajhala S, Appel A W. A Logic-based Network Security Analyzer[C]//Proc. of the 14th USENIX Security Symposium. Berkeley, USA: USENIX Association, 2005.
  • 5Ritchey R, O'Berry B, Noel S. Representing TCP/IP Connectivity for Topological Analysis of Network Security[C]//Proceedings of the 18th Annual Computer Security Applications Conference. Washington, USA: IEEE Computer Society, 2002.
  • 6Swiler L R Phillips C. A Graph-based System for Network Vulnerability Analysis Repor[C]//Proc. of ACM Workshop on New Security Paradigms. [S.l],: ACM Press, 1998.
  • 7Ammann P, Wijesekera D, Kaushik S. Scalable Graph-based Network Vulnerability Analysis[C]//Proc. of ACM Conference on Computer and Communications Security. [S.l.]: ACM Press, 2002:217-224.
  • 8Kyle I, Richard L, Keith R Practical Attack Graph Generation for Network Defense[C]//Proc. of Annual Computer Security Applications Conference. Miami Beach, USA:[s. n.], 2006:121 - 130.
  • 9赵芳芳,陈秀真,李建华.基于权限提升的网络攻击图生成方法[J].计算机工程,2008,34(23):158-160. 被引量:13
  • 10司加全,张冰,苘大鹏,杨武.基于攻击图的网络安全性增强策略制定方法[J].通信学报,2009,30(2):123-128. 被引量:13

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部