期刊文献+

动态攻击网络演化分析模型 被引量:2

Dynamic attack network evolution and analysis model
下载PDF
导出
摘要 将基于攻击图的脆弱性评估技术和动态网络演化分析相结合,提出了一种动态攻击网络演化与分析模型。该模型借鉴演变图的思想将攻击图拓展为随时间域和空间域同时变化的演变攻击图,在子图相似度定义的基础上构建攻击演化模式,分析模式内暂态变化的同时结合时序数据分析模式间的连接变化,以攻击演变挖掘算法为核心的模型应用分析过程,可以确定整个过程中攻击模式的数量,明晰每个模式的典型攻击结构,实例证明提出的模型和方法可以有效地模拟攻击发生的过程,当需要防御手段进行干预时,可有针对性地选择危害大的阶段或者节点来抑制攻击过程的发生。 This paper presented a new dynamic attack network evolution and analysis model based on the attack graph vulner- ability assessment technology and analysis on the evolution of dynamic network. Reference to the evolution graph, this model ex- panded the attack graph to evolution attack graph which change in time domain and space domain both, constructed the stage of evolution attack model based on sub graph similarity, analysed the transient change in phase mode and the connection mode among attack phase combined with the time series data, the attack evolution mining algorithm was the core of the analysis of model application process which could get the number of attacks model in the whole process and typical attack structure of each attack model. Example shows that the model can simulate the process of attack effectively,when need defense intervene means, network administrator can suppress the occurrence of attack process through the harmful stave or node.
作者 李艳 黄光球
出处 《计算机应用研究》 CSCD 北大核心 2016年第1期266-270,共5页 Application Research of Computers
基金 陕西省科学技术研究发展计划资助项目(2013K1117) 陕西省重点学科建设专项资金资助项目(E08001)
关键词 攻击图 演变图 动态网络 演化攻击图 网络风险分析 attack graph evolution graph dynamic network evolution attack graph network risk analysis
  • 相关文献

参考文献19

  • 1国家互联网应急中心.中国互联网网络安全报告[EB/OL].http://www.cert.org.cn/publish/main/46/2012120120523085533341215471/20120523085533341215471-html,2012.
  • 2Farmer D,Venema W.Improving the security of your site by breaking into it,ITSTD-721-FR-90-21[R].[S.l.] :USENET Newsgroup Security UNIX,1993.
  • 3Nessus homepage[EB/OL].2002.http://www.neaaus.org/.
  • 4蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:368
  • 5Phillips C A,Swiler L P.A graph-based system for network vulnerability analysis[C] //Proc of New Security Paradigms Workshop.New York:ACM Press,1998:71-79.
  • 6Swiler L P,Phillips C,Ellis D,et al.Computer-attack graph generation tool[C] //Proc of DARPA Information Survivability Conference and Exposition.2000.
  • 7Dacier M.Towards quantitative evaluation of computer security[D].France:Institute National Polytechnique de Toulouse,1994.
  • 8Ortalo R,Deswarte Y,Kaaniche M.Experimenting with quantitative evaluation tools for monitoring operational security[J].IEEE Trans on Software Engineering,1999,25(5):633-650.
  • 9Sheyner O,Haines J W,Jha S,et al.Automated generation and analysis of attack graphs[C] //Proc of IEEE Symposium on Security and Privacy.[S.l.] :IEEE Computer Society,2002:273-284.
  • 10陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341

二级参考文献89

共引文献976

同被引文献10

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部