期刊文献+

基于最小化攻击图的自动化渗透测试模型 被引量:2

Automated penetration test model base on Minimal Attack Graph
下载PDF
导出
摘要 完全攻击图在大规模网络上的应用效率并不理想,主机和漏洞数目的小幅增加导致时间消耗的大幅增加,最小化攻击图可以有效解决该问题.文章优化了最小化攻击图的生成算法并将其应用到渗透测试模型中,通过枚举路径为渗透测试提供测试方案,分析其关键节点提供防御部署的建议.重点解决了生成过程的冗余路径和循环攻击问题,同时利用最小化攻击图生成规模小、效率高的特点使渗透测试系统适用于大规模网络的应用. Building an automated penetration test model using minimal attack graph, we provide optimal path decision and defensive disposition for the system. Meanwhile we propose the method to control redundant path and cycle attack in the minimal attack graph generating algorithm. We utilize minimal attack graph' s character- istic to make this system suitable for large-scale network.
出处 《广州大学学报(自然科学版)》 CAS 2012年第3期70-74,共5页 Journal of Guangzhou University:Natural Science Edition
关键词 攻击图 渗透测试 脆弱点 网络安全 attack graph penetration test vulnerability network security
  • 相关文献

参考文献10

  • 1HERZOG P. Open-source security testing methodology manual [ EB/OL ]. [ 2009 - 12-10 ]. http ://isecom. securentled, corn/ osstmm, es. 3.0. pdf.
  • 2SWILER L P, PHILLIPS C, GAYLOR T. A graph-based network-vulnerability analysis system [ C ]. Proc of the 1998 Workshop on New Security Paradigms, NY : ACM, 1998:71-79.
  • 3SWILER L P, PHILLIPS C, ELLIS D,et al. Computer-Attack graph generation tool[ C] ffProc, of the 2nd DARPA Infor- mation Survivability Conf. & Exposition. CA : DISCK, 2001,2 : 307-321.
  • 4SHEYNER O, JHA S, WING J M, et al. Automated generation and analysis of attack graphs[ C]//The IEEE Syrup on Se- curity and Privacy. PA : IEEE, 2002:273-284.
  • 5AMMANN P, WIJESEKERA D, KAUSHIK S. Scalable, graph-based network vulnerability analysis [ C ]//Proc of the 9th ACM Cotff on Computer and Communications Security. New York: ACM Press, 2002: 217-224.
  • 6LIPPMANN R P, INGOI_S K W. An annotated review of past papers on attack graphs[ C]. Proc of the 2nd DARPA Infor- mation Survivability Conf & Exposition, 2001,2:307-321.
  • 7NIRNAY G, GHOSH S K. A planner-based approach to generate and analyze minimal attack graph [ J/. Applied Intelli- gence, 2012,36 ( 2 ) : 369 -390.
  • 8CVSS S. Common vulnerability scoring system[ EB/OL]. [2008-08-11 ]. http://www, first, org. cvss/,.
  • 9ZHANG Yong-zheng, YUN Xiao-chun, HU Ming-zeng. Based on the privilege of quantitative attributes ascension multidi- mensional classification of weakness [ J l. IEEE Transactions on Communications,2004,25 (7):107-114. (in Chinese).
  • 10WANG Li-dong. Operating system security evaluation and audit enhanced [ D ]. Harbin: Harbin Institue of Technology,2002. ( in Chinese).

同被引文献28

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部