期刊文献+

有组织的网络攻击行为结果的建模 被引量:7

Modeling on the Results of Organized Network Attack
下载PDF
导出
摘要 用数学的方法分析了有组织的网络攻击行为对网络信息系统造成的影响,首先对攻击者、被攻击对象、攻击行为和攻击结果进行定义,提出三条模型假设,然后分别针对个人攻击结果和有组织的攻击结果进行建模,对模型结果进行了讨论,最后提出几点安全建议并说明了进一步研究的思路。 The influence of organized network attack is analyzed by mathematical means. Firstly, the definitions of attacker, attack target, attack behavior and attack result are introduced. Then, based on three assumptions, models of individual attack results and organized attack results are constructed and discussed. Finally, some suggestions to information security system are brought out and considerations of further research are illuminated.
出处 《信息与电子工程》 2003年第2期1-6,共6页 information and electronic engineering
基金 国家863计划基金资助项目(863-307-7-5)
关键词 网络攻击 网络安全 组织 攻击行为 攻击结果 个人攻击 network security individual attack organized attack modeling
  • 相关文献

参考文献8

  • 1[1]Tidwell T Larson, R Fitch K, Hale J. Modeling Intemet Attacks[M]. ISBN 0-7803-9814-9, June 2001.
  • 2[2]Scambray Joel, McClure Stuart, Kurtz George. Hacking Exposed: Network Security Secrets & Solutions (Second Edition)[M].Berkley: McGraw Hill, 2001.
  • 3[3]Schumacher Markus, Roedig Utz. Security Engineering with Pattems[DB/OL]. http://jerry. cs.uiuc.edu/~plop/plop2001/accepted_submissions/PLoP2001/mschumacher0/PLoP200 1_mschumacher0_ 1 .pdf,2001-07-27.
  • 4[4]Moore Andrew, Ellison Robert, Linger Richard. Attack Modeling for Informational Security and Survivability[DB/OL]. CMU/SEI -2001-TN-001. http://www. cert.org/archive/pdf/01tn001.pdf, 2001-03.
  • 5[5]Schneier B. Attack Trees[J]. Dr. Dobb's Journal of Software Tools 24, 1999,(12):21-29.
  • 6[6]Moberg Fredrick. Security of an Information System using an attack tree methodology[DB/OL]. http://www. ce.chalmers.se/staff /jonsson/fredrik.moberg-thesis.pdf, 2000-11-16
  • 7[7]Steffan Jan, Schumacher Markus. Collaborative Attack Modeling[Z]. ACM 1-58113-445-02/02/03, 2 February 2002.
  • 8[8]Schudel Gregg, Wood Bradley. Modeling Behavior of the Cyber Terrorist[A] (submitted to) 2000 National Information Systems Security Conference, Baltimore MD, October 2000.

同被引文献13

引证文献7

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部