期刊文献+

基于规则的网络攻击事件生成方法

Generation Method for Network Attack Event Based on Regulation
下载PDF
导出
摘要 网络对抗试验因其过程快、交互强和安全隔离性高等特点,对网络安全能力测试评估提出了更高要求。提出了一种基于规则的网络攻击事件生成方法,为网络安全能力测试提供威胁驱动源。首先,从网络协议报头、攻击负载和交互行为统计3方面建立了攻击特征库,构造初始攻击报文;然后,建立了攻击特征变换规则,在不改变攻击能力前提下对初始攻击报文进行变换,生成网络攻击事件,以提高网络攻击模拟逼真度;最后,进行了某情报组网系统的威胁感知能力评估试验,验证了基于规则的网络攻击事件生成方法的有效性。 The evaluation of the network security ability is required in fast confrontation of test process, strong interaction and highly security isolation. An attack event generation method based on the regulation is proposed to provide threat-driven source for network security ability experiment. Firstly, the attack behavior characteristic library is built from network protocol dat- agram, attack load and interactive behavior. Secondly, the initial attack packet is constructed based on behavior characteristics. Thirdly, the attack characteristic transformation rule is built to transform the initial attack packet without changing the attack ability for improving the simula- tion fidelity of the network combatant behavior. Finally, the threat sensing ability evaluation ex- periment is conducted in some area intelligence networking systems. Experimental results show that the method can efficiently support ability evaluation experiment.
出处 《指挥信息系统与技术》 2015年第5期24-29,共6页 Command Information System and Technology
基金 国家"973"计划资助项目
关键词 网络攻击 攻击事件 攻击变换 规避检测 安全能力 network attack attack event attack transformation avoidance test security ability
  • 相关文献

参考文献8

  • 1周光霞,孙欣.赛博空间对抗[J].指挥信息系统与技术,2012,3(2):6-10. 被引量:25
  • 2范爱锋,程启月.赛博空间面临的威胁与挑战[J].火力与指挥控制,2013,38(4):1-3. 被引量:8
  • 3毛少杰,邓克波,王珩,易侃.网络化和服务化C^4ISR系统复杂性[J].指挥信息系统与技术,2012,3(4):1-6. 被引量:26
  • 4Camtepe S A, Yener B. A formal method for attack modeling and detection [EB/OL]. [2015-03-15]. ht- tp://cgi5, cs. rpi. edu/research/pdf/06-01, pdf.
  • 5Costantini K C. Attack modeling and simulation devel- opment of a Cyber attack simulator for network mod- eling and Cyber security analysis[D]. Rochester: De- partment of Industrial System Engineering Kate G1- eason College of Engineering, 2007.
  • 6Jajodia S, Noel S. Advanced Cyber attack modeling analysis and visualization, AFRL-RI-RS-TR-2010-078 [EB/OL]. (2010-03-15)[2015-03-01]. http://www. researchgate, net/publication/235092563 _ Advanced _Cyber_Attack_Modeling_Analysis and Visualization.
  • 7Sommers J,Barford P. Self-configuring network traffic generationEC // Proceedings of the 4th ACM SIG COMM Conference on Internet Measurement. Taorm- ina : ACM, 2004.
  • 8Ixia breaking point application and security test FEB/ OLd. [2015-03-011. http: /// www. ixiacom, corn/ products/ixia-breaking point, pdf.

二级参考文献35

  • 1徐敏 张聿坤编译.赛博空间作战.国际电子战,2009,(11):27-29.
  • 2王燕.赛博空间与电子战[J].国际电子战,2009,(11):36-36.
  • 3Joseph S N. Cyber Power [R].The Report of Harvard Kennedy School Belfer Center, 2010.
  • 4马丁·C·理贝基.网络威慑与网络战[M].北京:军事谊文出版社,2010.
  • 5The President of the Unite States. The national strategy to secure Cyberspace[R].Washington,DC:the White House,2003.
  • 6Chairman of the Joint Chiefs of Staff. National military strategy for Cyberspace operations (NMS-CO)[R].Washington,D.C.:US DoD,2006.
  • 7The President of the Unite States. Cyberspace policy review: assuring a trusted and resilient information and communications infrastructure[R].Washington,DC:the White House,2009.
  • 8United States Army Training and Doctrine Command. The United States Army's Cyberspace operations concept capability plan 2016-2028[R].Washington,D.C.:US DoD,2010.
  • 9LeMay Center for Doctrine Development and Education. Cyberspace operations[R].Washington,D.C.:The United States Air Force,2010.
  • 10US DoD. JP1-02:department of defense dictionary of military and associated terms[M].Washington,D.C.:US DoD,2011.

共引文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部