期刊文献+

网络风险评估技术中马尔科夫链的应用研究 被引量:4

Application Research of the Markov Chain in the Network Risk Assessment Technology
下载PDF
导出
摘要 现有的网络风险评估的方式主要是基于攻击图模型,最重要的步骤是在攻击图生成后,对其进行量化分析的过程。本文在分析攻击图生成方式和现有研究成果的基础上,提出了基于马尔科夫链的攻击图量化分析方法,并结合实例阐述了攻击图的生成过程。在网络攻击模型中,加入了可能性和复杂性的分析。因此,可以更为精确地对易受攻击环节和攻击成功概率进行定量评估。 The existed network risk assessment approaches were mainly based on attack graphs model, the most important step was the process of quantitative analysis after the generation of attack graph. The paper proposed attack graph analy- sis method based on Markov chain in the foundation of analysis of attack graph generation and existed research results, and elaborated the attack graph generation process with examples. In the network attack model, the possibility and the complexity of the analysis were joined in the method. Therefore, the vulnerable link and success probability of attack could be more accurate in quantitative evaluation.
作者 高立丽
出处 《科技通报》 北大核心 2013年第8期38-40,共3页 Bulletin of Science and Technology
关键词 网络风险评估 马尔科夫链 攻击图 成功概率 network risk evaluation markov chain attack graph the probability of success
  • 相关文献

参考文献5

二级参考文献60

  • 1隆茜,郭劲赤.985高校图书馆自建数据库的调查与分析[J].图书馆学研究(应用版),2010(9):27-31. 被引量:24
  • 2张涛,胡铭曾,李东,郑明.一种量化的软件弱点评估方法[J].计算机工程与应用,2005,41(27):7-9. 被引量:5
  • 3孙亮,李东,张涛.网络攻击图的自动生成[J].计算机应用研究,2006,23(3):119-122. 被引量:13
  • 4张永铮,方滨兴,迟悦.计算机弱点数据库综述与评价[J].计算机科学,2006,33(8):19-21. 被引量:8
  • 5GB征求意见稿,信息安全风险评估指南[S].北京:国务院信息化工作办公室,2005.
  • 6MELL P, SCARFONE K, ROMANOSKY S. A complete guide to the common vulnerability scoring system version 2.0[ EB/OL]. [ 2008 ]. http ://www, first, org/cvss/.
  • 7OU Xin-ming,BOYER W F,McQUEEN M A. A scalable approach to attack graph generation [ C ]//Proc of the 13th ACM Conference on Computer and Communications Security. 2006:336- 345,.
  • 8AMMANN P, WUESEKERA D,KAUSHIK S. Scalable, graph-based network vulnerability analysis[ C ]//Proc of the 9th ACM Conference on Computer and Communications Security. New York: ACM Press, 2002:217-224.
  • 9SHEYNER O, HAINES J, JHA S, et al. Automated generation and analysis of attack graphs[ C]//Proc of IEEE Symposium on Security and Privacy. Oakland, California : IEEE Press ,2002:254-265.
  • 10WANG Ling-yu, NOEl. S ,JAJODIA S. Minimum-cost network hardening using attack graphs [ J ]. Computer Communications, 2006,29 ( 18 ) :3812-3824.

共引文献113

同被引文献23

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部