期刊文献+

两种网络环境中权限提升攻击分析与对比

Analysis and comparison of permission-elevating attack under two networks environment
下载PDF
导出
摘要 为了分析分离映射网络对权限提升攻击的缓解作用,提出了一种基于损失期望的攻击图建模评估方法。首先根据网络状态和脆弱性信息确定属性节点和原子攻击节点,生成攻击图,然后根据攻击者选取的攻击序列计算其对目标网络造成损失的期望值。基于该方法对两种网络环境中权限提升攻击情况进行了建模分析对比,结果表明分离映射网络对权限提升攻击起到了良好的缓解作用,较传统网络具有明显的安全优势。 To analysis the role of the Identifier/Locator separated network in the mitigation of permission-elevating attack,an attack graph,a modeling and evaluating approach,based on the expected loss is introduced.First,determine the attribute nodes and the atomic attack nodes and generate the attack graph according to the network states and vulnerability information.On this basis,calculate the expectations of its loss on the target network according to the attacker's attack sequence.After a comparative analysis,it can be concluded that the Identifier/Locator separated network effectively alleviates the permission-elevating attack,and performs much better than the current one in network security.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第6期2101-2106,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(60833002 60903150 60972010) 中央高校基本科研业务费专项基金项目(2011JBM016)
关键词 攻击图 属性节点 原子攻击节点 损失期望 分离映射网络 权限提升攻击 attack graph attribute nodes atomic attack nodes expected loss identifier-locator split mapping network permission-elevating attack
  • 相关文献

参考文献16

  • 1LIU Ying, WAN Ming, ZHANG Hongke, et al. Research on the data reconstruction method based on Identifier/Locator sepa- ration architecture [J]. Joumal of Internet Technology, 2011, 12 (4): 531-539.
  • 2国家计算网络应急技术处理协调中心.2010年中国互联网网络安全报告[EB/OL].[2011-04-22].http://www.cert.org.cn/arti-cles/docs/common/2011042225342.shtml.
  • 3RFC 4882, IP address location privacy and mobile IPv6: Pro- blem statement [S]. Koodli R, 2007.
  • 4Draft-farinaeci-lisp-15, Locator/ID separation protocol (LISP) [S]. Farinacci D, Fuller V, Meyer D, et al. 2011.
  • 5Draft-whittle-ivip-db-fast-push-04, Ivip mapping database fast push [S]. Whittle R, 2010.
  • 6Draft-whittle-ivip-drtm-01, DRTM-Distributed real time map- ping for Ivip and LISP [S]. Whittle R, 2010.
  • 7Drafl-adan-idr-tidr-01, Tunneled inter-domain routing (TIDR) [S]. Adan J J, 2006.
  • 8张宏科,苏伟.新网络体系基础研究——一体化网络与普适服务[J].电子学报,2007,35(4):593-598. 被引量:127
  • 9董平,秦雅娟,张宏科.支持普适服务的一体化网络研究[J].电子学报,2007,35(4):599-606. 被引量:59
  • 10Murase T, Fukushima Y, Kobayashi M, et al. Performance evaluation of a multi-stage network event detection scheme against DDoS attacks [C]. 7th Asia-Pacific Symposium on In- formation and Telecommunication Technologies. Piscataway.. IEEE Publisher, 2008: 58-63.

二级参考文献66

  • 1Swiler LP,Phillips C,Gaylor T.A graph-based network-vulnerability analysis system.Technical Report,SANDIA Report No.SAND 97-3010/1,1998.
  • 2Swiler LP,Phillips C,Ellis D,Chakerian S.Computer-Attack graph generation tool.In:Proc.of the 2nd DARPA Information Survivability Conf.& Exposition.Los Alamitos:IEEE Computer Society Press,2001.307-321.
  • 3Lippmann RP,Ingols KW.An annotated review of past papers on attack graphs.Technical Report,ESC-TR-2005-054,MIT Lincoln Laboratory,2005.
  • 4Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities.In:Proc.of the 2000 IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2000.156-165.
  • 5Sheyner O,Jha S,Wing JM,Lippmann RP,Haines J.Automated generation and analysis of attack graphs.In:Hinton H,Blakley B,Abadi M,Bellovin S,eds.Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2002.273-284.
  • 6Jha S,Sheyner O,Wing J.Two formal analyses of attack graphs.In:Proc.of the 15th IEEE Computer Security Foundations Workshop.Cape Breton:IEEE Computer Society,2002.49-63.
  • 7Ou XM,Boyer WF,McQueen MA.A scalable approach to attack graph generation.In:Proc.of the 13th ACM Conf.on Computer and Communications Security.Alexandria:ACM Press,2006.336-345.
  • 8Ou XM.A logic-programming approach to network security analysis[Ph.D.Thesis].Princeton:Princeton University,2005.
  • 9Ammann P,Wijesekera D,Kaushik S.Scalable,graph-based network vulnerability analysis.In:Proc.of the 9th ACM Conf.on Computer and Communications Security.New York:ACM Press,2002.217-224.
  • 10Jajodia S,Noel S,O'Beny B.Topological analysis of network attack vulnerability.In:Kumar V,Srivastava J,Lazarevic A,eds.Proc.of the Managing Cyber Threats:Issues,Approaches and Challenges.Netherlands:Kluwer Academic Publisher,2003.

共引文献242

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部