期刊文献+

面向网络利用的移动Agent形式化研究

Formalization research for computer network exploitation based on mobile Agent
下载PDF
导出
摘要 计算机网络利用是计算机网络对抗中信息获取的主要手段,移动代理的引入使得计算机网络利用系统具有更大的自主性。文章提出了一种基于移动Agent的利用体框架,其具备信息和知识的产生功能,可根据预先制定的意图在网络中移动并获取信息;使用Petri网对该框架建模并分析和验证;结果表明该系统满足计算系统的可达、有界和活性等性质,在理论上具备可行性。 The computer network exploitation(CNE) is the major means to collect data in computer network operation. The mobile Agent(MA) makes the CNE have more ability to gather the data by moving. A new exploitation framework based on mobile Agent is proposed, which has the function of generating information and knowledge and is able to transfer the intention to task and finish it by moving in the Internet. The framework is formalized and verified by color Petri net, and the results show that its reachability, liveness and boundedness meet the requirement of computing system and it is feasible in theory.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2013年第5期572-575,共4页 Journal of Hefei University of Technology:Natural Science
基金 北京市科技面上计划资助项目(KM201211232010) 浙江省自然科学基金资助项目(Y1101053) 浙江省经济与信息化委员会信息服务专项资金资助项目(2010-360)
关键词 计算机网络对抗 移动AGENT 有色PETRI网 框架 computer network operation mobile Agent color Petri net frame
  • 相关文献

参考文献9

  • 1Wolfowitz P. DoDD3600. 1:information operations, rev 1[Z]. Washington D C:US Department of Defense,2001:36-37.
  • 2Department of Defense. JP1-02:department of defense dic-tionary of military associated terms [Z]. Washington DC:US Government Printing, 2006:101-102.
  • 3曹成,周健,周红,王明福.网络安全与对策[J].合肥工业大学学报(自然科学版),2007,30(9):1091-1094. 被引量:16
  • 4Department of Defense. JP3-13:information operations [Z].Washington DC:US Government Printing, 2006:112-119.
  • 5Lange D B. Mobile objects and mobile Agents:the future ofdistributed computing [C]//Proc of the Europen Conf onObject Programming? 98 Brussels ?1998:1-2.
  • 6Eugene H S, Zamboni D. Intrusion detection using autono-mous Agents [ J]. Computer Networks, 2000, 34(1):547-570.
  • 7Lange D B, Oshima M. Seven good reasons for mobile A-gents [ J]. Communications of the ACM, 1999,42(3):88-89.
  • 8王晋,李德全,冯登国.一种基于移动代理自动优化的分布式入侵检测系统[J].计算机研究与发展,2006,43(1):9-14. 被引量:6
  • 9Westergaard M. Cpn-tools[EB/OL]. [2010-03-09]. ht-tp://www. daimi. au. dk/CPNTools/.

二级参考文献17

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部