期刊文献+

基于最优攻击路径的网络安全增强策略研究 被引量:7

Approach on Network Security Enhancement Strategies Based on Optimal Attack Path
下载PDF
导出
摘要 为实现目标网络的适度安全,提出了一种基于最优攻击路径的网络安全增强策略制定方法。该方法对攻击目标进行风险评估,在分析攻击图最优攻击路径的基础上制定安全增强策略。为了获取最优攻击路径,提出了一种基于蚁群优化算法的最优攻击路径生成方法,并改进了信息素更新方式。仿真实验表明,所提方法能够有效地产生安全策略集,改进后的蚁群算法具有较强的全局搜索能力和更好的收敛性。 To reach the proportional security of the goal network,an approach on network security enhancement strategies based on optimal attack path was proposed.The approach assesses the risk of attack target,and makes strategies for network security enhancement on the basis of optimal attack path.To obtain optimal attack path,an approach to generating optimal attack path based on ant colony optimization algorithm was proposed,and the pheromone updating way was improved.Simulation results show that the proposed approach can generate strategies effectively,and the improved ant colony optimization algorithm has strong global search ability and rapid convergence.
出处 《计算机科学》 CSCD 北大核心 2013年第4期152-154,共3页 Computer Science
基金 陕西省自然科学基金(2010JM8004)资助
关键词 攻击图 蚁群优化算法 最优攻击路径 网络安全 Attack graphs Ant colony optimization Optimal attack path Network security
  • 相关文献

参考文献9

二级参考文献40

共引文献156

同被引文献61

  • 1丁金科,李东,郝志宇.网络攻击路径的生成研究[J].微计算机信息,2008,24(9):60-61. 被引量:2
  • 2季庆光,冯登国.对几类重要网络安全协议形式模型的分析[J].计算机学报,2005,28(7):1071-1083. 被引量:23
  • 3王永杰,刘进,陈志杰,鲜明,王国玉.一种计算机网络脆弱性评估系统的设计[J].计算机工程,2006,32(17):200-202. 被引量:7
  • 4孙一品,钟求喜,苏金树.基于隐马尔可夫模型的攻击意图识别技术研究[J].计算机工程与科学,2007,29(8):19-22. 被引量:6
  • 5Kark, K., Penn, J., Dill, A. 2008 CISO priorities: The right objectives but the wrong focus[J]. Le Magazine de la Srcurit6 Informatique, April 2009.
  • 6Friedberg, J. Intemet fraud battlefield[Z], http: // www.ftc.gov/ bcp/ workshops/ proofpositive/ Battlefield_ Overview.pdf. April 2007.
  • 7Barth, A., Rubinstein, B.I.P., Sundararajan, M. A learn ing-based approach to reactive security[Z], http: //arxiv.org /abs/0912.1155, 2009.
  • 8Cavusoglu, H., Raghunathan, S., Yue, W. Decision-th eoretic and game-theoretic approaches to IT security invest ment[J]. Journal of Management Information Systems, 2008, 25 (2) : 281-304.
  • 9Miura-Ko, R., Bambos, N.: SecureRank. A risk-based vulnerability management scheme for computing infrastmctures[C]. In: Proceedings of IEEE International Conference on Communications, 2007: 1455-1460.
  • 10Fultz, N., Grossklags, J. Blue versus Red: Towards a model of distributed security attacks. Proceedings of the Thi rteenth International Conference Financial Cryptography and Data Security, February 2009.

引证文献7

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部