期刊文献+

公共网络协同防护攻击性建模仿真研究 被引量:4

Research on Modeling and Simulation of Public Network Cooperative Protection
下载PDF
导出
摘要 对公共网络协同防护攻击性进行准确建模,可以对公共网络协同防护攻击进行有效防御。进行协同防护攻击性建模时,应分析公共网络协同防护攻击路径,并生成公共网络协同防护攻击图,依据攻击图中脆弱点的攻击难度确定协同防护攻击状态转移概率完成建模,传统的方法主要通过预测各攻击子路径的风险来进行建模,不能生成准确的协同防护攻击图,无法计算协同防护攻击状态转移概率,导致建模误差大。提出扩展马尔科夫链的公共网络协同防护攻击性建模方法。获取公共网络资源状态节点集合,给出攻击图节点置信度,构造公共网络协同防护攻击路径,并计算各攻击子路径的风险成本,组建协同防护攻击行为的风险系数模型,获得各种攻击状态节点转移相应的权重,确定相应的攻击状态转移概率,并组建公共网络协同防护攻击图。将协同防护攻击脆弱点的攻击难度作为协同防护攻击状态转移概率的确定标准,完成基于扩展马尔科夫链的公共网络协同防护攻击性模型构建。仿真结果表明,所提方法可以有效地提高公共网络节点的置信度,提升对攻击路径的预测能力。 A modeling method of collaborative protection aggressiveness in public network is proposed based on the extended Markov chain. Firstly, the state node set of public network information is obtained and the confidence degree of attack graph node is given to build the attack path of collaborative protection. The risk cost of each attack sub - path is also calculated and the risk coefficient model of collaborative protection attack is built to obtain the corresponding weight of various attack state node. Then the corresponding state transition probability is confirmed and the attack graph is built. Finally, the attack difficulty of collaborative protection attack vulnerability is used as the confirmed standard of state transition probability and the modeling of collaborative protection aggressiveness in public network is completed based on the extended Markov chain. The simulation results show that the method mentioned above can improve the confidence degree of public network node effectively. It can enhance the prediction ability of attack path.
作者 李凤 陈婷婷 LI Feng CHEN Ting - ting(Nanchang University College of Science and Technology, Nanchang Jjiangxi 330029, Chin)
出处 《计算机仿真》 北大核心 2017年第6期298-301,共4页 Computer Simulation
关键词 公共网络 协同防护攻击 数学建模 Public network Collaborative protection attack Mathematical modeling
  • 相关文献

参考文献10

二级参考文献105

  • 1高济,吕何新,郭航,张凡,程昱,傅朝阳,王存浩.可信的自治式服务协同模型和应用开发构架[J].中国科学(F辑:信息科学),2009,39(11):1146-1175. 被引量:10
  • 2薄翠梅,张湜,王执铨,李俊.基于滑动时间窗的支持向量机软测量建模研究[J].自动化仪表,2006,27(1):45-48. 被引量:14
  • 3陈克,刘士场,王幸军.AHP法改进及其在目标威胁等级评估中的应用[J].指挥控制与仿真,2006,28(1):108-110. 被引量:9
  • 4罗德林,段海滨,吴顺详,李茂青.基于启发式蚁群算法的协同多目标攻击空战决策研究[J].航空学报,2006,27(6):1166-1170. 被引量:49
  • 5Pfleeger S L, et al, Insiders behaving badly: Addressing bad actors and their actions. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 169-179.
  • 6Afghan war diary, 2004-2010 [EB/OLJ. http://wikileaks. org/wiki/ Afghan_ WacDiary_2004-2010. 2010-07.
  • 7Schonlau M, Dumouchel W, Iu W, et al. Computer intrusion: Detecting masquerades. Statistical Science, 2001: 58-74.
  • 8Salem M, Stolfo S. Modeling user search behavior for masquerade detectionllProceeding of the 14th International Symposium Recent Advances in Intrusion Detection. Berlin Heidelberg: Springer, 2011: 181-200.
  • 9Zheng N, Palo ski A, Wang H, An efficient user verification system via mouse movementsllProceedings of the 18th ACM Conference On Computer and communications. Chicago, Illinois, USA, 2011: 139-150.
  • 10Brackney R C, Anderson R H. Understanding the Insider Threat: Proceedings of a March 2004 Workshop. Santa Monica, CA: RAND Corporation, 2004. http://www. rand. org/ pubs/conLproceedings/CF196.

共引文献171

同被引文献35

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部