期刊文献+

Prediction of network attack profit path based on NAPG model

原文传递
导出
摘要 The network attack profit graph(NAPG)model and the attack profit path predication algorithm are presented herein to cover the shortage of considerations in attacker’s subjective factors based on existing network attack path prediction methods.Firstly,the attack profit is introduced,with the attack profit matrix designed and the attack profit matrix generation algorithm given accordingly.Secondly,a path profit feasibility analysis algorithm is proposed to analyze the network feasibility of realizing profit of attack path.Finally,an opportunity profit path and an optimal profit path are introduced with the selection algorithm and the prediction algorithm designed for accurate prediction of the path.According to the experimental test,the network attack profit path predication algorithm is applicable for accurate prediction of the opportunity profit path and the optimal profit path.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2020年第5期91-102,共12页 中国邮电高校学报(英文版)
基金 the National Natural Science Foundation of China(61802117)。
  • 相关文献

参考文献1

二级参考文献15

  • 1SHAH C. Zeus crime ware toolkit[EB/OL]. http://blogs.mcafee.com/ mcafeelabs/zeus-crimeware-toolkit.
  • 2QIN X, LEE W. Statistical causality of INFOSEC alert data[C]// Re-cent Advances in Intrusion Detection 2003. Berlin, 2003: 73-93.
  • 3VALEUR F, VIGNA G, KRUEGEL C, et al. A comprehensive ap-proach to intrusion detection alert correlation[J]. IEEE Trans. De-pendable and Secure Computing, 2004, 1(3): 146-169.
  • 4JAJODIA S, NOEL S, KALAPA P, et al. Cauldron: mission-centric cyber situational awareness with defense in depth[C]//The Military Communications Conference. Baltimore, 2011: 1339-1344.
  • 5YU D, FRINCKE D. Improving the quality of alerts and predicting intruder’s next goal with hidden colored petri-net[J]. Computer Net-works, 2007,51(3): 632-654.
  • 6WANG L, ISLAM T, LONG T, et al. An attack graph-based probabil-istic security metric[C]//Data and Applications Security XXII. Berlin Heidelberg, 2008: 283-296.
  • 7XIE P, LI J H, OU X M, et al. Using Bayesian networks for cyber security analysis[C]//The 40th IEEE/IFIP International Conference on Dependable Systems and Networks(DSN). Chicago, 2010: 211-220.
  • 8ABRAHAM S, NAIR S. A predictive framework for cyber security analytics using attack graphs[J]. International Journal of Computer Networks & Communications, 2015, 7(1): 1-17.
  • 9FREDJ O B. A realistic graph-based alert correlation system[J]. Secu-rity and Communication Network, 2015, 8(15): 2477-2493.
  • 10张少俊,李建华,宋珊珊,李斓,陈秀真.贝叶斯推理在攻击图节点置信度计算中的应用[J].软件学报,2010,21(9):2376-2386. 被引量:29

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部