期刊文献+

网络攻击图逆向深度优先生成算法 被引量:8

Network attack graph backward depth-first building algorithm
下载PDF
导出
摘要 大规模网络节点数量多,连接关系复杂,现有攻击图生成方法存在节点爆炸问题,针对大规模网络的这种特点,提出了一种逆向深度优先攻击图生成算法。首先对攻击图的相关概念进行了简要介绍,并分析了逆向生成算法流程。然后,鉴于生成攻击图过程中要对网络可达性进行测试,因此,同时提出了基于区间树的规则匹配算法,最后,对攻击图生成算法进行了实际环境测试,并对测试结果进行了验证分析。实验结果表明,该攻击图生成算法能以O(lgn)的时间复杂度高效检测网络可达性,优化网络攻击图生成结果。 Large-scale network has numerous nodes and complicated connection,which causes nodes explosion.Aimingat this characteristic,this paper puts forward a kind of attack graph building algorithm based on backward depth-first.Firstly,it explains the attack graph conception briefly,and analyzes the backward building algorithm.Whereas building attackgraph needs network reachability test,and it brings up rule matching algorithm at the same time.Finally,it validatesthe attack graph algorithm in real network environment,and analyzes the result,which illuminates that the attack graphbuilding algorithm can test network reachability efficiently in O(lgn)and optimize the attack graph building result.
作者 司健 陈鹏 顾宁平 孙凌枫 王蔚旻 SI Jian;CHEN Peng;GU Ningping;SUN Lingfeng;WANG Weimin(The First Research Department, No.28 Research Institute, China Electronics Technology Group Corporation, Nanjing 210007, China)
出处 《计算机工程与应用》 CSCD 北大核心 2017年第3期131-137,共7页 Computer Engineering and Applications
关键词 网络攻击图 攻击模板 有效路径 区间树 规则匹配 network attack graph attack pattern available path segment tree rule matching
  • 相关文献

参考文献3

二级参考文献38

  • 1苘大鹏,张冰,周渊,杨武,杨永田.一种深度优先的攻击图生成方法[J].吉林大学学报(工学版),2009,39(2):446-452. 被引量:23
  • 2张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 3Ritchey R W,Ammann P.Using model checking to analyze network vulnerabilities[C].Proceedings of IEEE Symposium on Security and Privacy,2009:156–165.
  • 4Phillips C,Swiler L.A graph-based system for network vulnerability analysis[C].Proceedings of the 1998 Workshop on New Security Paradigms Table of Contents,1998:71-79.
  • 5Gupta S,Winstead J.Using attack graphs to design systems[C].IEEE Security and Privacy,2007:80-83.
  • 6Danforth M.Scalable patch management using evolutionary analysis of attack graphs[C].ICMLA,2008:300-307.
  • 7Wang L Y,Liu A Y,Jajodia Sushil,et al.Using attack graphs for correlating,hypothesizing,and predicting intrusion alerts[C].Computer Communications,2006,29(15):2917-2933.
  • 8Foo B,Wu Y S,Mao Y C,et al.ADEPTS:adaptive intrusion response using attack graphs in an e-commerce environment[C].In:Proc.of the 2005 Int'l Conf.on Dependable Systems and Networks,2005:508-517.
  • 9Kotapati K,Liu P,Thomas F,et al.Evaluating MAPSec by marking attack graphs[C].Wireless Networks,2009:1042-1058.
  • 10Manuel C,Bertolotti I C.Detecting chains of vulnerabilities in industrial networks[C].IEEE Transactions on Industrial Informatics,2009.

共引文献30

同被引文献56

引证文献8

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部