期刊文献+

基于并行遗传算法的网络最优弥补研究 被引量:1

Research of Minimum-cost Network Hardening Based on Parallel Genetic Algorithm
下载PDF
导出
摘要 将攻击图与并行遗传算法相结合,提出了一种基于并行遗传算法的网络最优弥补模型PGA-ONHM(optimal network hardening model based on parallel genetic algorithm),该模型能得到目标网络系统的近似解。为了验证该模型的可行性、有效性和可扩展性,本文从不同的分析角度进行仿真验证,实验结果表明:并行遗传算法的CPU消耗时间随着初始属性节点数量的增加呈多项式增加,随着子群体数量的增加呈减小趋势;无论是平均迭代次数还是单次迭代的平均计算时间,并行遗传算法比经典遗传算法都要优越;并行遗传算法可以得到较好的加速比;能够克服局部最优解的问题,可以适用于大规模复杂的网络系统。 This paper combines attack graph and parallel genetic algorithm and proposes a new minimum-cost network hardening PGA-ONHM based on the parallel genetic algorithm, which can be used to obtain the approximate solution of the target network system. In order to verify the feasibility, effectiveness and scalability of the proposed model, the results show that the CPU consumption time of the parallel genetic algorithm increases with the increase of the number of the initial nodes. The parallel genetic algorithm is superior to the classical genetic algorithm, and can overcome the problem of local optimal solution.
作者 袁媛 刘昌明
出处 《科技通报》 北大核心 2016年第2期140-144,共5页 Bulletin of Science and Technology
基金 2013年四川省自然科学基金项目(411672280)
关键词 网络脆弱性 攻击图 网络脆弱性弥补 network vulnerability attack graph minimum-cost network hardening
  • 相关文献

参考文献6

  • 1Phillips C,Swiler L. A graph-based system for networkvulnerability analysis[C]//Proc. Of the New Security Para-digms Workshop, Charlottesville,1998:71-79.
  • 2Sheyner O,Haines J,Jha S,et al. Automated generationand analysis of attack graphs[C]//Hinton H, Blackley B,Abadi M, Bellovin S, eds. Proc. Of the IEEE Symposm onSecurity and Privacy. Oakland: IEEE Computer SocietyPress,2002:254-265.
  • 3Sheyner O.Scenario graphs and attack graphs[D].CarnegieMellon University,2004.
  • 4Homer J.A comprenhensive approach to enterprise net-work security management[D].Kansas State University,2008.
  • 5Wang L Y,Noel S,Jajodia S. Minimum-cost network hard-ening using attack graphs[J].Computer Communications,2006,29(18): 3812-3824.
  • 6Chen F,Wang L Y,Su J S. An efficient approach to mini-mum- cost network hardening using attack graphs[C].Proc. Of the Fourth International Conference on Informa-tion Assurance and Security,2008:209-212.

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部