期刊文献+

基于APT潜伏攻击的网络可生存性模型与分析 被引量:9

Modeling and Analysis for Network Survivability of APT Latent Attack
下载PDF
导出
摘要 基于传统网络攻击模式和高级持续性威胁(Advanced Persistent Threat,简称APT)攻击模式提出网络可生存性的评估模型.建立网络攻击场景,仿真验证提出的网络可生存性模型,并比较两种模式的性能.得到的结论:提出的评估模型合理刻画了网络可生存性的两个重要参数,网络攻击传播速率和网络修复速率;基于APT潜伏攻击模式下的网络可生存性性能低于传统攻击模式. The paper proposes the model of network survivability based on the patterns of normal network attack and APT attack. The model is demonstrated by constructing the simulation scenarios of network attack to analyze their performances. The results showthat this evaluation model can effectively reflect two parameters: the speeds of network attack propagation and network recovery,and the performance of network survivability of APT attack pattern is lower than that of normal attack pattern.
出处 《电子学报》 EI CAS CSCD 北大核心 2016年第10期2415-2422,共8页 Acta Electronica Sinica
基金 国家973重点基础研究发展规划(No.2013CB329101) 国家自然科学基金(No.61232017 61003283) 国家科技重大专项(No.2013ZX03006002)
关键词 潜伏攻击 网络可生存性 评估模型 马尔科夫链 APT network survivability evaluating model Markov chain
  • 相关文献

参考文献20

  • 1Jeun I, Lee Y, Won D. A practical study on advanced per- sistent threats[ J ]. Computer Applications for Security, Control and System Engineering ,2012,11 : 144 - 152.
  • 2Zetter K. Google hack attack was ultra sophisticated, new details show [ J]. Wired Magazine, 2010,14: 33 - 36.
  • 3Langner R. Stuxnet: dissecting a cyberwarfare weapon [ J ]. IEEE Security &Privacy,2011,9(3) : 49 -51.
  • 4肖新光.恶意代码对抗体系演进的四部曲[EB/OL].http://www.antiy.net/papers/.
  • 5Bencseth B, P6k G, Butty6n L, et al. The cousins of stux- net: duqu, flame, and gauss [ J ]. Future Internet, 2012,4 (4) : 971 - 1003.
  • 6Lee J D. Targeted cybefattacks: a superset of advanced per- sistent threats [ J ]. IEEE security & privacy, 2013,11 ( 3 ) : 54 - 61.
  • 7Giura P, Wang W. A context-based detection framework for advanced persistent threats [ A ]. International Conference on Cyber Security [ C] ,Washington,2012.69 - 74.
  • 8Dube T E, Raines R A, Grimaila M R, et al. Malware target recognition of unknown threats[ J ]. IEEE Systems Journal, 2013,7(3) : 467 -477.
  • 9Johnson J R, Hogan E A. A graph analytic metric for miti- gating advanced persistent threat [ A ]. IEEE International Conference on Intelligence and Security Informatics [ C ], Seattle,2013. 129- 133.
  • 10Sterbenz J P G, Hutchison D, ? etinkaya E K, et al. Resil- ience and survivability in communication networks: Strat- egies ,principles, and survey of disciplines [ J ], Computer Networks,2010,54(8) : 1245 - 1265.

二级参考文献20

  • 1黄遵国,卢锡城,胡华平.生存能力技术及其实现案例研究[J].通信学报,2004,25(7):137-145. 被引量:20
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3王超,马建峰.可生存网络系统的构建方法[J].电子学报,2005,33(B12):2336-2341. 被引量:4
  • 4刘海涛,洪炳熔,朴松昊,王雪梅.不确定性环境下基于进化算法的强化学习[J].电子学报,2006,34(7):1356-1360. 被引量:12
  • 5苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811. 被引量:17
  • 6KNIGHT J C,SULLIVAN K J.On the Definition of Survivability[R].Charlottesville,VA,US:Dept of Computer Science,University of Virginia,2000.Technical Report CS-TR-33-00.
  • 7LIN Jian-ren,YANG Xiao-long,et al.Catastrophe model construction and verification for network anomaly detection[A].Proc of SPIE Asia-Pacific Optical Communications(APOC'08)[C].Bellingham,Washington,US:SPIE Press,2008.71371Q1-71371Q8.
  • 8BESSANI A N,SOUSA P,et al.Intrusion-tolerant Protection for Critical Infrastructures[R].Lisbon,Portugal:Dept.of Informatics,University of Lisbon,2007.Technical Report DL/FCUL-TR-07-8.
  • 9FU S,XU C.Service migration in distributed virtual machines for adaptive grid computing[A].Proc of the 34th International Conference on Parallel Processing(ICPP' 05)[C].Maryland,US:IEEE Computer Society Press,2005.358-365.
  • 10LAI Wei-kuang,SHIEH Chin-shiuh,et al.Service migration:a new peradigm for content distribution systems[A].Proc of the3rd International Conference on Communications and Networking in China(ChinaCom'08)[C].New Jersey,US:IEEE Press,2008.34-38.

共引文献12

同被引文献89

引证文献9

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部