期刊文献+

一种改进的信息网络安全防御图模型及生成方法研究 被引量:1

Research on an Improved Information Network Security Defence Model and Production Method
下载PDF
导出
摘要 研究已有防御图模型,提出一种基于假设的新型防御图模型,并给出生成方法。给出攻击模板、攻防模板和防御图算法,利用Graphviz和防御策略数据库,结合贪婪假设、单一性假设和单调性假设生成防御图,实现对网络安全状态整体真实反映,给出主动防御策略。 This paper researched the existed defense graph model,proposed a new defense graph model that based on three assumptions. This paper gave attack template,attack and defense template, the algorithm of attack graph,using Graphviz and defense policy database to generate attack and defense graph,reflects the overall security state of network,gave the active defense strategies.
出处 《山东电力技术》 2014年第1期7-10,15,共5页 Shandong Electric Power
关键词 网络安全 主动防御图 攻击图 攻防模板 主动防御策略 network security active defense graph attack graph attack and defense template active defense strategy
  • 相关文献

参考文献13

  • 1姜伟,方滨兴,田志宏,张宏莉.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4):817-827. 被引量:153
  • 2林旺群,王慧,刘家红,邓镭,李爱平,吴泉源,贾焰.基于非合作动态博弈的网络安全主动防御技术研究[J].计算机研究与发展,2011,48(2):306-316. 被引量:63
  • 3张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 4张涛,胡铭曾,云晓春,李东,孙亮.网络攻击图生成方法研究[J].高技术通讯,2006,16(4):348-352. 被引量:7
  • 5Chen Y,Boehm B,Sheppard LValue driven security threat modeling based on attack path analysis [C ]. Los Alamitos,Proeof the 40th Annual Hawaii Int Conf on System Sciences. CA :IEEE Computer Society, 2007.
  • 6Ritchey R W,Ammann P. Using model checking to analyze network vulnerabilities [C ]. Oakland,California,USA,In Proceedings of the IEEE Symposium on Security and Privacy,2001.
  • 7Sheyner O,Haines J,J ha S,et al. Automated generation and analysis of attack graphs [C]. California,USA,In Proceedings of the 2002 IEEE Symposium on Security and Privacy,2002.
  • 8S hahriari H R,Jalili R. Modeling and analyzing network vulnerabilities via a logic2based approach [C]. Shiraz,Iran,In Proceedings of Second International Symposium of Telecommunications (IST2005),2005.
  • 9Ou X, Bayer W F,McQueen M A. A scalable approach to attack graph generation [ C] . Alexandria, Virginia, USA, CCS' 06,2006.
  • 10Ammann P, Wijesekera D, Kaushik S. Scalable,Graph-based Network Vu[nerabihty Analysis [C ]. New York ,USA: ACM Press, Proceedings of the 9th ACM Conference on Computer and Communications Security.2002.

二级参考文献54

共引文献256

同被引文献4

引证文献1

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部