期刊文献+

一种面向组合攻击效能评估的Enhanced LAMBDA描述语言 被引量:1

An enhanced LAMBDA description language oriented to combined attack effectiveness evaluation
下载PDF
导出
摘要 利用描述语言进行攻击建模能够更有效地刻画攻击细节。通过对网络攻击效能进行评估,可以对网络攻击的效果给出定性和定量的评价,检验攻击行为的有效性,有助于制定有效的网络安全策略。基于LAMBDA语言,扩充了时间约束和效能约束方面的描述能力,提出了一种增强的攻击描述语言Enhanced LAMBDA,并给出了Enhanced LAMBDA的应用实例。最后,利用DARPA数据集LLDOS1.0构造了网络组合攻击的测试场景,基于Enhanced LAMBDA对其进行效能评估。实验结果表明,Enhanced LAMBDA能有效支持网络组合攻击的效能评估。 Modeling attack actions with description language can depict the details of the attack more effectively. By evaluating the effectiveness of network attacks, the qualitative and quantitative evalua- tion of the effect of network attacks is concluded, and it can test the effectiveness of attack actions and help to establish effective security policy of network. Based on the LAMBDA description language, this paper expands its expressiveness on time constraints and effectiveness constraints, proposes an enhanced attack description language, the enhanced LAMBDA, and then gives an application example of the en- hanced LAMBDA. In the end, this paper uses DARPA data set, the LLDOS1.0, to construct a test sce- nario of combined attack of network and evaluates its effectiveness based on the enhanced LAMBDA. The experimental results indicate that Enhanced LAMBDA can effectively support the evaluation of ef- fectiveness of combined attacks.
出处 《计算机工程与科学》 CSCD 北大核心 2013年第7期53-59,共7页 Computer Engineering & Science
基金 国家自然科学基金资助项目(61271252 61105050)
关键词 攻击建模 LAMBDA 描述语言 效能评估 attack modeling LAMBDA description language effectiveness evaluation
  • 相关文献

参考文献2

二级参考文献35

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2洪利华,罗均平,刘已斌.基于主成分分析法的目标威胁评估[J].指挥控制与仿真,2006,28(2):49-52. 被引量:17
  • 3Cunningham W H. Optimal Attack and Reinforcement of a Network [J] .Journal of the ACM (JACM), 1985, 32(3): 549- 561.
  • 4Kuang R B. Rule Based Security Checking[R]. Technical Report, MIT lab for Computer Science, 1994.
  • 5Swiler L P, Phillips C, Gaylor T.A Graph Based Network Vulnerability Analysis System, SAND97- 3010/1[R]. Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, 1998.
  • 6Ritchey R W, AmmannP. Using Model Checking to Analyze Network Vulnerabilities[ C]//Proceedings of the IEEE Computer Society Syraposium on Security and Privacy(S&P 2000), Oakland, California, 2000:156 - 165.
  • 7Jha S, Sheyner O, Wing J. Two Formal Analyses of Attack Graphs[ C]//Proceedings of the 15^th IEEE Computer Security Foundations Workshop (CSFW'15), Cape Breton, Nova Scotia, Canada, 2002: 49-63,.
  • 8Sheyner O, Haines J, Jha S, et al. Automated Generation and Analysis of Attack Graphs[ C]//Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P 2002), Oakland, California, 2002: 254- 265.
  • 9Ammann P, Wijesekem D, Kaushik S. Scalable, Graph-based Network Vulnerability Analysis[C]//Proceedings of the 9^th ACM Conference on Computer and Communications Security (CCS'02), Washington DC, ACM, 2002: 217-224.
  • 10Zhang T, Hu M Z, Li D, et al. An Effective Method to Generate Attack Graph [J]. Machine Learning and Cybernetics, 2005:3926- 3931.

共引文献27

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部