期刊文献+

基于不确定攻击图的攻击路径的网络安全分析 被引量:12

Analysis of Network Security Based on Uncertain Attack Graph Path
下载PDF
导出
摘要 随着科学技术的发展,现有攻击图生成算法在描述突发网络拥塞、网络断开、网络延迟等意外情况时存在不足;并且对于在攻击图中同样可以达到目标状态的攻击路径,哪一条路径网络更可靠等问题还未开始研究。通过不确定图模型提出了一种攻击图的生成算法,从攻击者的目标出发,逆向模拟生成攻击图,可以较好地模拟现实攻击情况并找出最可靠攻击路径,而且可以避免在大规模网络中使用模型检测方法出现状态空间爆炸的问题,以帮助防御者更好地防御网络漏洞攻击。实验结果表明,该方法能够正确生成攻击图,并且对大型网络的模拟也很实用。 With the development of science and technology,the existing attack graph generation algorithm has deficiencies in describing of network congestion,network disconnection,network delays and other unforeseen circumstances.And in pathing out which route network will be more reliable when all the routes can achieve the same target state has not keen studied in pathing out.Researches nowadays about the uncertain graph have delicate descriptions about the real network.Therefore,this thesis will put forward a new algorithm through uncertain graph model,and we can simulate the reality of attacks by reverse simulation to generate attack graph from the target of attackers and we can also avoid the troubles of space explosion to help defenders against the risks of network vulnerabilities.Through experiments we fond that our approach can generate the attack graph correctly and it is also practical for the simulation of large networks.
出处 《计算机科学》 CSCD 北大核心 2017年第S1期351-355,共5页 Computer Science
基金 国家自然科学基金(61272295 61105039 61202398) 湘潭大学智能计算与信息处理教育部重点实验室 湖南省重点学科建设项目(0812)资助
关键词 不确定图 攻击图 模型检测 网络漏洞攻击 Uncertain graph Attack graph Model check Network vulnerabilities attack
  • 相关文献

参考文献2

二级参考文献29

  • 1张涛,胡铭曾,云晓春,张永铮.计算机网络安全性分析建模研究[J].通信学报,2005,26(12):100-109. 被引量:41
  • 2王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:56
  • 3SCHNEIER B.Secrets and Lies[M].John Wiley and Sons,2000.318-333.
  • 4SCHNEIER B.Attack trees:modeling security threats[J].Dr Dobb's Journal,1999,12(24):21-29.
  • 5TIDWELL T,LARSON R,FITCH K,et al.Modeling Internet attacks[A].Proceedings of the 2001 IEEE Workshop on Information Assurance and Security[C].2001.54-59.
  • 6庄朝辉.基于攻击树的多层次入侵检测及其在Linux上的原型[D].厦门:厦门大学硕士论文,2002.
  • 7ANDREW P,MOOR E.Attack Modeling for Information Security and Survivability[R].Technical Notes,Carnegie Mellon University,2001.
  • 8FREDRIK M.Security Analysis of an Information System Using an Attack Tree-based Methodology[D].Chalmers University of Technology,2000.
  • 9JOHN S,MABEN R.Intrusion Detection with Support Vector Machines and Generative Models[R].Technical Research Report,University of Maryland,2002.
  • 10Creating Secure Systems through Attack Tree Modeling[R].Resources Red Teaming Articles and Papers,Amenaza Technologies Limited.2003.

共引文献69

同被引文献117

引证文献12

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部