期刊文献+

一种新颖的自动化攻击图生成方法

A Novel Technology of Automatic Generation of Attack Graph
下载PDF
导出
摘要 攻击图在网络安全评估和防御方面,占有重要地位。通过对攻击图的分析,网络管理者可以预知网络脆弱程度,采取加强网络安全性的措施。基于原子域的攻击图生成算法,其在生成时间复杂度和扩展性方面具有实用性的优势;本文通过对网络评估系统的介绍,重点介绍基于原子域的攻击图生成系统在网络安全评估中的应用设计与实现,同时对基于原子域生成系统进行性能测试。 Attack Graph act crisis role on internet security estimation and anti-virus defense.By analyzing on the attack graphs,network administrators can estimate the threshold on the network and then come out measures on improving the relevant defect.We have announced the Algorithm on Generating the Attack Graph(AGAG) based on atomic domain.AGAG shows its practical strength on reducing time complexity and its flexibility on extendibility.This paper proposes a collaborative framework and implementation on Attack Graph Generation System(AGGS) for Internet security measurements and estimation.We also evaluated the system by conducting experiments on atomic domain,the analysis on mainly on its time complexity is also included in this paper.
出处 《微计算机信息》 2012年第1期120-121,92,共3页 Control & Automation
关键词 网络安全评估 攻击图 原子域 自动生成算法 Network Security Assessment Attack Graph Atomic domain Automatic Generating Algorithm
  • 相关文献

参考文献1

二级参考文献8

  • 1蒋文保,郝双,戴一奇,刘庭华.高速网络入侵检测系统负载均衡策略与算法分析[J].清华大学学报(自然科学版),2006,46(1):106-110. 被引量:29
  • 2陈友,程学旗,李洋,戴磊.基于特征选择的轻量级入侵检测系统[J].软件学报,2007,18(7):1639-1651. 被引量:78
  • 3Dae Y. Kim, Sunil Kim, et al. A high- throughput system architecture for deep packet filtering in network intrusion prevention[C]. International Conference on Architecture of Computing Systems. Frankfurt/Main,Germany, 2006:407 - 421.
  • 4Wu Yang, Bin-Xing Fang, Bo Liu, Hong-Li Zhang. Intrusion detection system for high-speed network[J].Computer Communications, 2004, 27:1288 - 1294.
  • 5Khaled Labib, V Rao Vemuri. An application of principal component analysis to the detection and visualization of computer network attacks[J]. Annales of Telecommunications, 2006, 61(1):218- 234.
  • 6BOYER RS,MOORE J S. A fast string searching algorithm[J]. Communications of ACM, 1977, 20(10):762-772.
  • 7Aho A. and Corasick M.. Efficient string matching: an aid to bibliographic search[J]. Communietions of ACM, 1975,18:33-40.
  • 8张国华,肖频.一种基于网络的入侵检测系统设计[J].微计算机信息,2009,25(6):70-72. 被引量:11

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部