期刊文献+

网络攻击效果评估研究综述

Survey of Cyber Attack Effectiveness Evaluation Research
下载PDF
导出
摘要 随着网络攻击日益频繁、形式千变万化,防御者需要预测可能发生何种攻击以及对网络造成何种影响,也需要在攻击发生时了解自身网络遭受的实际损伤情况以及攻击对网络所支持的任务的影响,这就需要进行网络攻击效果评估为防御者提供科学的决策依据。首先,澄清了网络攻击效果评估的概念和研究范围。其次,针对目前网络攻击效果评估集中研究的2个部分内容:破坏效果评估和任务影响评估,分别梳理了其研究目标、相关技术方法和存在的问题。最后,对网络攻击效果评估研究中存在的问题进行了分析,指出了未来研究的方向。 As cyber attacks are becoming more frequent and diversified in forms,defenders need to predict the impact of possible attacks on the network,understand the actual damage to their network and the impact of the attack on the mission supported by the network when the attack occurs.There-fore,cyber attack effectiveness assessment is required to provide a scientific basis for the defender to make decisions.Firstly,the concept and research scope of the cyber attack effectiveness assessment are clarified in this paper.Secondly,the current cyber attack effectiveness assessment focuses on two main parts:cyber battle damage assessment and mission impact assessment.The assessing meth-ods and existing problems are analyzed respectively.Finally,the challenges of the research on at-tack effectiveness assessment are discussed,and the directions of future research are prospected.
作者 李航天 邱菡 刘自勉 朱俊虎 LI Hangtian;QIU Han;LIU Zimian;ZHU Junhu(Information Engineering University,Zhengzhou 450001,China)
机构地区 信息工程大学
出处 《信息工程大学学报》 2023年第2期230-235,256,共7页 Journal of Information Engineering University
关键词 网络攻击效果评估 任务影响评估 破坏效果评估 cyber attack effect assessment mission impact assessment battle damage assessment
  • 相关文献

参考文献6

二级参考文献66

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2王卫东.安全度量及其面临的挑战[J].保密科学技术,2011(3):54-58. 被引量:1
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 4中华人民共和国计算机信息系统安全保护条例(国务院令第147号)[EB/OL].1994[2009-12-10].http://baike.baidu.com/view/99664htm?fr=a1a0.
  • 5国家信息化领导小组关于加强信息安全保障工作的意见(中办发[2003]27号)[EB/OL].2003[2009-12-10].http://www.docin.com/p-29297294.html.
  • 6Staniford S,Paxson V,Weaver N.How to own the Internet in your spare time.In:Proc.of the 11th USENIX Security Symp.2002.149-167.
  • 7Moore D,Shannon C,Voelker GM.Internet quarantine:Requirements for containing self-propagating code.In:Proc.of the 22ndAnnual Joint Conf.of the IEEE Computer and Communications Societies(INFOCOM 2003).2003.1869-1879.[doi:10.1109/INFCOM.2003.1209212].
  • 8Brumley D,Liu LH,Poosankam P,Song D.Design space and analysis of worm defense strategies.In:Proc.of the 2006 ACMSymp.on Information,Computer and Communications Security(ASIACCS 2006).2006.125-137.[doi:10.1145/1128817.1128837].
  • 9Wei Y.Analyzing the performance of Internet worm attack approaches.In:Proc.of the 13th Int’l Conf.on ComputerCommunications and Networks(ICCCN 2004).2004.501-506.[doi:10.1109/ICCCN.2004.1401717].
  • 10Nicol DM,Liljenstam M.Models and analysis of active worm defense.In:Proc.of the MMM-ACNS 2005.LNCS 3685,Heidelberg:Springer-Verlag,2005.38-53.[doi:10.1007/11560326_4].

共引文献314

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部