期刊文献+

电力光网攻击路径生成和可视化展示方法研究 被引量:2

Electric Power Optical Network Attack Path Generation and Visualization Display Method Research
下载PDF
导出
摘要 入侵者对电力光网中的某一目标进行攻击时,需沿某攻击路径才可成功入侵目标节点;但随着目标电力光网结点数量的逐渐增加,生成的攻击路径将呈指数级增长,导致路径冗余,影响生成路径的整体性能。为此,提出一种新的电力光网攻击路径生成和可视化展示方法,介绍了原子攻击、攻击图和攻击路径的定义。对攻击路径进行成本收益分析,在此基础上提出入侵可行性模型,将入侵者对攻击路径的选择问题变成入侵可行性计算问题。当POS集合含有电力光网攻击图所有有向边时,通过遍历POS集合元素生成电力光网的攻击路径。对电力光网攻击路径的生成过程进行展示。实验结果表明,所提方法不存在冗余现象,且生成的攻击路径效果佳、可靠性高。 Invaders to attacks on electric power optical network of a goal,take along some attack route to a successful invasion target node,but gradually increase in the number of target power optical network node,attack path generated will exponentially,cause path redundancy,affect the overall performance of the generated path. For this,a new electric power optical network attack path generation and visualization display method were put forward,atomic attack,attack graph is introduced and the definition of attack path. Cost benefit analysis of attack path,invasion of feasibility of the model based on this,advances,the invaders for intrusion attack path selection problem into feasibility calculation problem,when all POS collection contains power optical network attack graph to the edge,by iterating through POS set elements to generate electric power optical network attack path. The optical network attack path for power generation process to display. The experimental results show that the proposed method does not exist redundant phenomenon,and generate good attack path effect,high reliability.
作者 李伟伟 马媛媛 周诚 李千目 LI Wei-wei MA Yuan-yuan ZHOU Cheng LI Qian-mu(Global Energy Internet Research Inst ute, Nanjing 210003 , P. R. China)
出处 《科学技术与工程》 北大核心 2017年第10期246-250,共5页 Science Technology and Engineering
基金 国家电网公司2015年科技项目(SGRIXTKJ[2015]614)资助
关键词 电力光网 攻击路径生成 可视化展示 electric power optical network attack path generation visual display
  • 相关文献

参考文献5

二级参考文献48

  • 1Schneier B.Secrets and Lies:Digital Security in a Networked World[M].New York,USA:John Wiley & Sons,2000.
  • 2Man Da-peng,Zhang Bing,Yang Wu,et al.A method for global attack graph generation[C]//Proceedings of 2008 IEEE International Conference on Networking,Sensing and Control.Sanya,China:IEEE Computer Society Press,2008:236-241.
  • 3Phillips C,Laura S P.A graph based syatem for network vulnerability analysis[C]//Proceedings of the 1998 Workshop on New Securityparadigms.VA,USA:ACM,1998:71-79.
  • 4Wang Da-zhi,Bharat B M,Kishor S.Security analysis of SITAR intrusi on tolerance system[C]//Proceedings of the 2003Workshop on Survivable and Self-Regenerative Systems,in Association with 10th ACM Conference on Computer and Communications Security 2003.New York,USA:Association for Computing Machinery,2003:23-32.
  • 5Wang Fei yi,Jou F,Gong Feng-min,et al.SITAR:Scalable in trusion tolerance architecture for distributed services[C]//Proceedings of the IEEE Second SMCInform at ion Assurance Workshop.West Point,New York,USA:IEEE Press,2001:38-45.
  • 6Singh S,Cukier M,Sanders W H.Probabilistic validation of an intrusion tolerant replication system[C]// Proceedings of the International Conference on Dependable Systems and Networks.San Francisco,USA:IEEE Press,2003:616-624.
  • 7Swiler L P,Phillips C,Gaylor T.A Graph Based Network-Vulnerability Analysis System[C]// Technical Report SAND97-3010/1,Sandia National Laboratories.Albuquerque,New Mexico and Livermore,California,1998.
  • 8Ammann P,Wijesekera D,Kaushik S.Scalable Graph-Based Network Vulnerability Analysis[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security.New York:ACM Press,2002:217-224.
  • 9Cynthia P,Laura P S.A graph-based system for network-vulnerability analysis system[C]//ACM New Security Paradigms Workshop.1998.
  • 10Jha S,Sheyner O,Wing J M.Minimization and reliability analyses of attack graphs[R].Technical Report CMUCG-02-109.Carnegie Mellon University,February 2002.

共引文献12

同被引文献25

引证文献2

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部