期刊文献+

攻击图的网络威胁自动建模方法研究 被引量:2

Automatic Network Threats Modeling for Attack Graph
原文传递
导出
摘要 为了增强网络的安全性,对网络整体进行威胁分析和评估应用,结合攻击图的特点,研究并提出了一种攻击图的网络威胁自动化建模方法。在攻击图生成之前,抽象出网络威胁数学模型,包括主机信息、拓扑信息、漏洞信息和攻击者信息四个组成部分。并针对所建的网络威胁模型提出自动建模方法和具体的自动化流程。基于此,结合攻击事件的Büchi模型和CTL描述,使用符号模型检验算法自动生成攻击图,为攻击图的应用奠定基础。 In order to strengthen the security of network and carry out analysis and assessment of network threats,and based on the characteristics of attack graph,an automatic network threats modeling method for attack graph is proposed.Before generating attack graph,the network threats model is abstracted,including the information of four components such as host,topology,vulnerability and attacker.Then in accordance with the network threats model,the automatic modeling method and its automatic flow are given.Based on these and model checking algorithm,and in combination of Büchi model and CTL description,the attack graph is generated.The research could lay a foundation for the application of attack graph.
出处 《通信技术》 2012年第9期86-89,92,共5页 Communications Technology
基金 国家自然科学基金项目(批准号:61171173)
关键词 网络威胁 攻击图 自动建模 模型检验 漏洞 network threats; attack graph; automatic modeling; model checking; vulnerability
  • 相关文献

参考文献7

二级参考文献74

  • 1沈桂兰,李辉,李玉霞.基于改进Kerberos的Web单点登录方案[J].微计算机信息,2008,24(3):128-130. 被引量:6
  • 2张涛,胡铭曾,云晓春,李东,孙亮.网络攻击图生成方法研究[J].高技术通讯,2006,16(4):348-352. 被引量:7
  • 3王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:55
  • 4Nicol D M,Sanders W H,Trivedi K S.Model-based evaluation:From dependability to security[J].IEEE Transactions on Dependable and Secure Computing,2004,1(1):48-64.
  • 5Sheyner O.Automated generation and analysis of attack graphs[C]//Proceedings of the 2002 IEEE Symposium on Security and Privacy.2002:273-284.
  • 6Swiler P,Phillips C.A Graph-based System for Network Vulnerability Analysis[R].SAND-98-1127C,1997.
  • 7Ammann P,Wijesekera D.Scalable,graph-based network vulnerability analysis[C]//Proceedings of the ACM Conference on Computer and Communications Security,2002:217-224.
  • 8Noel S,Jajodia S,Bo'berry E A.Efficient minimum-cost network hardening via exploit dependency graphs[C]//Proceedings of the 19th Annual Computer Security Application Conference.2003:86-95.
  • 9Li Wei.An Approach to model network exploitations using exploitation graph[J].Simulation,2006,82(8):523-541.
  • 10Li Wei.Modeling and simulating system exploitations through exploitation graphs for security engineenng[C]//Proceedings of the 39th Hawaii International Conference on System Sciences,2006:237-244.

共引文献71

同被引文献3

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部