期刊文献+

基于Rete算法的攻击图构建方法 被引量:1

Generation Method of Attack Graph Based on Rete Algorithm
下载PDF
导出
摘要 针对现有攻击图构建方法适用的网络规模受限的问题,通过分析现有方法存在的缺陷及构建过程中的特点,使构建攻击图转化为威胁行动属性之间的模式匹配,将Rete引入到攻击图构建过程中,提出基于Rete的攻击图构建方法。实验结果表明,该方法具有较好的构建效率,能够适用于大规模网络的攻击图构建。 Aiming at the problem that the applicable network scale for existing attack graph generation methods is limited, through analysis of the shortage of the existing attack graph construction methods and the characteristics of the construction process, the constructed attack graph is transformed into a pattern matching between the threat action properties. Rete is introduced into the construction process of attack graph, an attack graph building method based on Rete is proposed. Experimental results show that the method has better construction efficiency and can be applied to the construction of attack graph in large-scale network.
出处 《计算机工程》 CAS CSCD 北大核心 2018年第3期151-155,165,共6页 Computer Engineering
关键词 网络安全 攻击图 RETE算法 大规模网络 攻击图构建 模式匹配 network security attack graph Rete algorithm large-scale network attack graph generation patternmatch
  • 相关文献

参考文献6

二级参考文献47

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 3张永铮,方滨兴,迟悦,云晓春.网络风险评估中网络节点关联性的研究[J].计算机学报,2007,30(2):234-240. 被引量:52
  • 4王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:56
  • 5Swiler LP,Phillips C,Gaylor T.A graph-based network-vulnerability analysis system.Technical Report,SANDIA Report No.SAND 97-3010/1,1998.
  • 6Swiler LP,Phillips C,Ellis D,Chakerian S.Computer-Attack graph generation tool.In:Proc.of the 2nd DARPA Information Survivability Conf.& Exposition.Los Alamitos:IEEE Computer Society Press,2001.307-321.
  • 7Lippmann RP,Ingols KW.An annotated review of past papers on attack graphs.Technical Report,ESC-TR-2005-054,MIT Lincoln Laboratory,2005.
  • 8Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities.In:Proc.of the 2000 IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2000.156-165.
  • 9Sheyner O,Jha S,Wing JM,Lippmann RP,Haines J.Automated generation and analysis of attack graphs.In:Hinton H,Blakley B,Abadi M,Bellovin S,eds.Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2002.273-284.
  • 10Jha S,Sheyner O,Wing J.Two formal analyses of attack graphs.In:Proc.of the 15th IEEE Computer Security Foundations Workshop.Cape Breton:IEEE Computer Society,2002.49-63.

共引文献126

同被引文献6

引证文献1

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部