期刊文献+
共找到446篇文章
< 1 2 23 >
每页显示 20 50 100
MULTI-FIGHTER COORDINATED MULTI-TARGET ATTACK SYSTEM 被引量:7
1
作者 耿延洛 姜长生 李伟浩 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2004年第1期18-23,共6页
A definition of self-determined priority is used in airfight decision firstly. A scheme of grouping the whole fighters is introduced, and the principle of target assignment and fire control is designed. Based on the ... A definition of self-determined priority is used in airfight decision firstly. A scheme of grouping the whole fighters is introduced, and the principle of target assignment and fire control is designed. Based on the neutral network, the decision algorithm is derived and the whole coordinated decision system is simulated. Secondly an algorithm for missile-attacking area is described and its calculational result is obtained under initial conditions. Then the attacking of missile is realized by the proportion guidance. Finally, a multi-target attack system. The system includes airfight decision, estimation of missile attack area and calculation of missile attack procedure. A digital simulation demonstrates that the airfight decision algorithm is correct. The methods have important reference values for the study of fire control system of the fourth generation fighter. 展开更多
关键词 multi-target attack coordinated airfight decision missile attack area priority fire control
下载PDF
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network 被引量:6
2
作者 Shaojun Zhang Shanshan Song 《Journal of Information Security》 2011年第1期8-27,共20页
Network attack graphs are originally used to evaluate what the worst security state is when a concerned net-work is under attack. Combined with intrusion evidence such like IDS alerts, attack graphs can be further use... Network attack graphs are originally used to evaluate what the worst security state is when a concerned net-work is under attack. Combined with intrusion evidence such like IDS alerts, attack graphs can be further used to perform security state posterior inference (i.e. inference based on observation experience). In this area, Bayesian network is an ideal mathematic tool, however it can not be directly applied for the following three reasons: 1) in a network attack graph, there may exist directed cycles which are never permitted in a Bayesian network, 2) there may exist temporal partial ordering relations among intrusion evidence that can-not be easily modeled in a Bayesian network, and 3) just one Bayesian network cannot be used to infer both the current and the future security state of a network. In this work, we improve an approximate Bayesian posterior inference algorithm–the likelihood-weighting algorithm to resolve the above obstacles. We give out all the pseudocodes of the algorithm and use several examples to demonstrate its benefit. Based on this, we further propose a network security assessment and enhancement method along with a small network scenario to exemplify its usage. 展开更多
关键词 NETWORK Security attack graph POSTERIOR INFERENCE Bayesian NETWORK Likelihood-Weighting
下载PDF
Hybrid hierarchical trajectory planning for a fixed-wing UCAV performing air-to-surface multi-target attack 被引量:5
3
作者 Yu Zhang Jing Chen Lincheng Shen 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第4期536-552,共17页
This paper considers the problem of generating a flight trajectory for a single fixed-wing unmanned combat aerial vehicle (UCAV) performing an air-to-surface multi-target attack (A/SMTA) mission using satellite-gu... This paper considers the problem of generating a flight trajectory for a single fixed-wing unmanned combat aerial vehicle (UCAV) performing an air-to-surface multi-target attack (A/SMTA) mission using satellite-guided bombs. First, this problem is formulated as a variant of the traveling salesman problem (TSP), called the dynamic-constrained TSP with neighborhoods (DCT- SPN). Then, a hierarchical hybrid approach, which partitions the planning algorithm into a roadmap planning layer and an optimal control layer, is proposed to solve the DCTSPN. In the roadmap planning layer, a novel algorithm based on an updatable proba- bilistic roadmap (PRM) is presented, which operates by randomly sampling a finite set of vehicle states from continuous state space in order to reduce the complicated trajectory planning problem to planning on a finite directed graph. In the optimal control layer, a collision-free state-to-state trajectory planner based on the Gauss pseudospectral method is developed, which can generate both dynamically feasible and optimal flight trajectories. The entire process of solving a DCTSPN consists of two phases. First, in the offline preprocessing phase, the algorithm constructs a PRM, and then converts the original problem into a standard asymmet- ric TSP (ATSP). Second, in the online querying phase, the costs of directed edges in PRM are updated first, and a fast heuristic searching algorithm is then used to solve the ATSP. Numerical experiments indicate that the algorithm proposed in this paper can generate both feasible and near-optimal solutions quickly for online purposes. 展开更多
关键词 hierarchical trajectory planning air-to-surface multi-target attack (A/SMTA) traveling salesman problem (TSP) proba-bilistic roadmap Gauss pseudospectral method unmanned com-bat aerial vehicle (UCAV).
下载PDF
Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks 被引量:1
4
作者 Binhui Tang Junfeng Wang +3 位作者 Huanran Qiu Jian Yu Zhongkun Yu Shijia Liu 《Computers, Materials & Continua》 SCIE EI 2023年第1期235-252,共18页
The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cy... The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cyber Threat Intelligence(CTI)can facilitate APT actors’profiling for an immediate response.However,it is difficult for traditional manual methods to analyze attack behaviors from cyber threat intelligence due to its heterogeneous nature.Based on the Adversarial Tactics,Techniques and Common Knowledge(ATT&CK)of threat behavior description,this paper proposes a threat behavioral knowledge extraction framework that integrates Heterogeneous Text Network(HTN)and Graph Convolutional Network(GCN)to solve this issue.It leverages the hierarchical correlation relationships of attack techniques and tactics in the ATT&CK to construct a text network of heterogeneous cyber threat intelligence.With the help of the Bidirectional EncoderRepresentation fromTransformers(BERT)pretraining model to analyze the contextual semantics of cyber threat intelligence,the task of threat behavior identification is transformed into a text classification task,which automatically extracts attack behavior in CTI,then identifies the malware and advanced threat actors.The experimental results show that F1 achieve 94.86%and 92.15%for the multi-label classification tasks of tactics and techniques.Extend the experiment to verify the method’s effectiveness in identifying the malware and threat actors in APT attacks.The F1 for malware and advanced threat actors identification task reached 98.45%and 99.48%,which are better than the benchmark model in the experiment and achieve state of the art.The model can effectivelymodel threat intelligence text data and acquire knowledge and experience migration by correlating implied features with a priori knowledge to compensate for insufficient sample data and improve the classification performance and recognition ability of threat behavior in text. 展开更多
关键词 attack behavior extraction cyber threat intelligence(CTI) graph convolutional network(GCN) heterogeneous textual network(HTN)
下载PDF
A graph based system for multi-stage attacks recognition
5
作者 Safaa O.Al-Mamory 《High Technology Letters》 EI CAS 2008年第2期167-173,共7页
Building attack scenario is one of the most important aspects in network security.This paper pro-posed a system which collects intrusion alerts,clusters them as sub-attacks using alerts abstraction,ag-gregates the sim... Building attack scenario is one of the most important aspects in network security.This paper pro-posed a system which collects intrusion alerts,clusters them as sub-attacks using alerts abstraction,ag-gregates the similar sub-attacks,and then correlates and generates correlation graphs.The scenarios wererepresented by alert classes instead of alerts themselves so as to reduce the required rules and have the a-bility of detecting new variations of attacks.The proposed system is capable of passing some of the missedattacks.To evaluate system effectiveness,it was tested with different datasets which contain multi-stepattacks.Compressed and easily understandable Correlation graphs which reflect attack scenarios were gen-erated.The proposed system can correlate related alerts,uncover the attack strategies,and detect newvariations of attacks. 展开更多
关键词 network security intrusion detection alert correlation attack graph SCENARIO clus-tering
下载PDF
A network security situation awareness method based on layered attack graph
6
作者 ZHU Yu-hui SONG Li-peng 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2019年第2期182-190,共9页
The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is div... The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is divided into several logical subnets by community discovery algorithm.The logical subnets and connections between them constitute the logical network.Then,based on the original and logical networks,the selection of attack path is optimized according to the monotonic principle of attack behavior.The proposed method can sharply reduce the attack path scale and hence tackle the state explosion problem in NSSA.The experiments results show that the generation of attack paths by this method consumes 0.029 s while the counterparts by other methods are more than 56 s.Meanwhile,this method can give the same security strategy with other methods. 展开更多
关键词 network security situation awareness(NSSA) layered attack graph(LAG) state explosion community detection
下载PDF
基于图卷积神经网络的WSN零动态攻击检测方法
7
作者 崔玉礼 黄丽君 《太原学院学报(自然科学版)》 2025年第1期78-84,共7页
零动态攻击与一般攻击方式相比,隐蔽性更强,因此更不容易被发现。以往常规的检测方法在检测这种攻击方式时,漏检率和误检率较高。针对上述问题,研究一种基于图卷积神经网络的WSN零动态攻击检测方法。基于零动态攻击原理,以信道状态信息... 零动态攻击与一般攻击方式相比,隐蔽性更强,因此更不容易被发现。以往常规的检测方法在检测这种攻击方式时,漏检率和误检率较高。针对上述问题,研究一种基于图卷积神经网络的WSN零动态攻击检测方法。基于零动态攻击原理,以信道状态信息作为采集源,利用CSI-Tools工具实现CSI数据包采集。从CSI数据包中分离出幅值数据和相位数据,针对前者实施去噪处理,针对后者实施校准处理。从幅值数据和相位数据中提取4个特征,以特征为输入,构建图结构,利用图卷积神经网络实现无线传感网络零动态攻击检测。结果表明:基于图卷积神经网络的攻击检测方法的漏检率和误检率相对更低,由此说明该方法对零动态攻击检测更为有效,能够实现更为准确的检测。 展开更多
关键词 图卷积神经网络 无线传感网络 CSI数据 零动态攻击
下载PDF
A Robustness Model of Complex Networks with Tunable Attack Information Parameter 被引量:4
8
作者 吴俊 谭跃进 +1 位作者 邓宏钟 李勇 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第7期2138-2141,共4页
We introduce a novel model for robustness of complex with a tunable attack information parameter. The random failure and intentional attack known are the two extreme cases of our model. Based on the model, we study th... We introduce a novel model for robustness of complex with a tunable attack information parameter. The random failure and intentional attack known are the two extreme cases of our model. Based on the model, we study the robustness of complex networks under random information and preferential information, respectively. Using the generating function method, we derive the exact value of the critical removal fraction of nodes for the disintegration of networks and the size of the giant component. We show that hiding just a small fraction of nodes randomly can prevent a scale-free network from collapsing and detecting just a small fraction of nodes preferentially can destroy a scale-free network. 展开更多
关键词 INTENTIONAL attack RANDOM graphS RESILIENCE BREAKDOWN INTERNET
下载PDF
QIM digital watermarkingbased on LDPC code and messagepassingunder scalingattacks
9
作者 崔鑫 颜斌 +1 位作者 贾霞 王亚菲 《Journal of Measurement Science and Instrumentation》 CAS 2014年第1期37-40,共4页
Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronizati... Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronization attacks of QIM digital watermarking,a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed,and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework.Using the theory of iterative estimation and decoding,the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark.The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise.For constant amplitude scaling attacks,the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters.The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization. 展开更多
关键词 digital watermarking quantization index modulation (QIM) message passing algorithm based on factor graph low density parity check (LDPC) code amplitude scaling attack
下载PDF
Deeply Understanding Graph-Based Sybil Detection Techniques via Empirical Analysis on Graph Processing
10
作者 Jian Mao Xiang Li +1 位作者 Qixiao Lin Zhenyu Guan 《China Communications》 SCIE CSCD 2020年第10期82-96,共15页
Sybil attacks are one of the most prominent security problems of trust mechanisms in a distributed network with a large number of highly dynamic and heterogeneous devices,which expose serious threat to edge computing ... Sybil attacks are one of the most prominent security problems of trust mechanisms in a distributed network with a large number of highly dynamic and heterogeneous devices,which expose serious threat to edge computing based distributed systems.Graphbased Sybil detection approaches extract social structures from target distributed systems,refine the graph via preprocessing methods and capture Sybil nodes based on the specific properties of the refined graph structure.Graph preprocessing is a critical component in such Sybil detection methods,and intuitively,the processing methods will affect the detection performance.Thoroughly understanding the dependency on the graph-processing methods is very important to develop and deploy Sybil detection approaches.In this paper,we design experiments and conduct systematic analysis on graph-based Sybil detection with respect to different graph preprocessing methods on selected network environments.The experiment results disclose the sensitivity caused by different graph transformations on accuracy and robustness of Sybil detection methods. 展开更多
关键词 Sybil attack graph preprocessing Edge computing trust model
下载PDF
融合威胁情报与知识图谱的网络攻击溯源方法 被引量:1
11
作者 张玉臣 孙澄 +2 位作者 姜迎畅 马军强 胡浩 《情报杂志》 CSSCI 北大核心 2024年第8期72-83,91,共13页
[研究目的]攻击溯源是网络空间安全保障的重要组成部分,面对网络空间数据海量、异质多元、结构松散等特点,亟需大数据分析与人工智能相结合,有效识别敌手攻击威胁,溯源攻击链和背后的攻击组织,并实施针对性防御。[研究方法]针对攻击威... [研究目的]攻击溯源是网络空间安全保障的重要组成部分,面对网络空间数据海量、异质多元、结构松散等特点,亟需大数据分析与人工智能相结合,有效识别敌手攻击威胁,溯源攻击链和背后的攻击组织,并实施针对性防御。[研究方法]针对攻击威胁特征识别难的问题,提出了知识图谱驱动的网络攻击溯源方法,以脆弱性利用动作为核心构建攻击事件框架,并以事件为单位实施告警关联,重构攻击场景。在此基础上,利用威胁指纹知识图谱,整合已公开的威胁情报知识,并抽取攻击场景中的威胁特征作为指纹,分析两者相似性,溯源攻击者。[研究结论]实验结果表明,该方法能够利用攻击事件框架充实攻击行为的上下文信息,并基于知识图谱有效溯源攻击者,从而利用攻击者已有的威胁情报,增强高级可持续攻击威胁特征识别的全面性。 展开更多
关键词 威胁情报 威胁指纹 知识图谱 攻击溯源 威胁识别 场景重构
下载PDF
基于溯源图和注意力机制的APT攻击检测模型构建 被引量:1
12
作者 李元诚 罗昊 +1 位作者 王欣煜 原洁璇 《通信学报》 EI CSCD 北大核心 2024年第3期117-130,共14页
针对现有攻击检测方法难以应对持续时间长、攻击手段复杂隐蔽的高级持续威胁的问题,构建了基于注意力机制和溯源图的APT攻击检测模型。首先,基于系统的审计日志构建能够描述系统行为的溯源图;其次,设计优化算法,确保在不牺牲关键语义的... 针对现有攻击检测方法难以应对持续时间长、攻击手段复杂隐蔽的高级持续威胁的问题,构建了基于注意力机制和溯源图的APT攻击检测模型。首先,基于系统的审计日志构建能够描述系统行为的溯源图;其次,设计优化算法,确保在不牺牲关键语义的前提下缩减溯源图规模;再次,利用深度神经网络(DNN)将原始攻击序列转换为语义增强的特征向量序列;最后,设计并实现了APT攻击检测模型DAGCN,该模型将注意力机制应用于溯源图序列,利用该机制对输入序列的不同位置分配不同的权重并进行权值计算,能够提取较长时间内的持续攻击的序列特征信息,从而有效地识别恶意节点,还原攻击过程。该模型在识别精确率等多个指标上均优于现有模型,在公开的APT攻击数据集上的实验结果表明,该模型在APT攻击检测中的精确率达到93.18%,优于现有主流检测模型。 展开更多
关键词 溯源图 自然语言处理 APT攻击检测 注意力机制
下载PDF
结合图卷积神经网络和集成方法的推荐系统恶意攻击检测
13
作者 刘慧 纪科 +3 位作者 陈贞翔 孙润元 马坤 邬俊 《计算机科学》 CSCD 北大核心 2024年第S01期940-948,共9页
推荐系统已被广泛应用于电子商务、社交媒体、信息分享等大多数互联网平台中,有效解决了信息过载问题。然而,这些平台面向所有互联网用户开放,导致不法用户利用系统设计缺陷通过恶意干扰、蓄意攻击等行为非法操纵评分数据,进而影响推荐... 推荐系统已被广泛应用于电子商务、社交媒体、信息分享等大多数互联网平台中,有效解决了信息过载问题。然而,这些平台面向所有互联网用户开放,导致不法用户利用系统设计缺陷通过恶意干扰、蓄意攻击等行为非法操纵评分数据,进而影响推荐结果,严重危害推荐服务的安全性。现有的检测方法大多都是基于从评级数据中提取的人工构建特征进行的托攻击检测,难以适应更复杂的共同访问注入攻击,并且人工构建特征费时且区分能力不足,同时攻击行为规模远远小于正常行为,给传统检测方法带来了不平衡数据问题。因此,文中提出堆叠多层图卷积神经网络端到端学习用户和项目之间的多阶交互行为信息得到用户嵌入和项目嵌入,将其作为攻击检测特征,以卷积神经网络作为基分类器实现深度行为特征提取,结合集成方法检测攻击。在真实数据集上的实验结果表明,与流行的推荐系统恶意攻击检测方法相比,所提方法对共同访问注入攻击行为有较好的检测效果并在一定程度上克服了不平衡数据的难题。 展开更多
关键词 攻击检测 共同访问注入攻击 推荐系统 图卷积神经网络 卷积神经网络 集成方法
下载PDF
基于时空图神经网络的应用层DDoS攻击检测方法
14
作者 王健 陈琳 +1 位作者 王凯崙 刘吉强 《信息网络安全》 CSCD 北大核心 2024年第4期509-519,共11页
分布式拒绝服务(Distributed Denial of Service,DDoS)攻击已经成为网络安全的主要威胁之一,其中应用层DDoS攻击是主要的攻击手段。应用层DDoS攻击是针对具体应用服务的攻击,其在网络层行为表现正常,传统安全设备无法有效抵御。同时,现... 分布式拒绝服务(Distributed Denial of Service,DDoS)攻击已经成为网络安全的主要威胁之一,其中应用层DDoS攻击是主要的攻击手段。应用层DDoS攻击是针对具体应用服务的攻击,其在网络层行为表现正常,传统安全设备无法有效抵御。同时,现有的针对应用层DDoS攻击的检测方法检测能力不足,难以适应攻击模式的变化。为此,文章提出一种基于时空图神经网络(Spatio-Temporal Graph Neural Network,STGNN)的应用层DDoS攻击检测方法,利用应用层服务的特征,从应用层数据和应用层协议交互信息出发,引入注意力机制并结合多个GraphSAGE层,学习不同时间窗口下的实体交互模式,进而计算检测流量与正常流量的偏差,完成攻击检测。该方法仅利用时间、源IP、目的IP、通信频率、平均数据包大小5维数据便可有效识别应用层DDoS攻击。由实验结果可知,该方法在攻击样本数量较少的情况下,与对比方法相比可获得较高的Recall和F1分数。 展开更多
关键词 DDOS攻击 时空图神经网络 异常检测 注意力机制
下载PDF
基于知识图谱的空管信息系统威胁评估研究
15
作者 顾兆军 杨文 +1 位作者 隋翯 李志平 《计算机科学》 CSCD 北大核心 2024年第S02期925-935,共11页
随着空管信息系统的智能化和开放化发展,风险暴露面正逐渐增大。威胁评估是有效评估空管信息系统脆弱性和安全风险的重要手段,但以往的威胁评估模型大多存在两方面的局限。一方面,通常只关注威胁信息的显性关联关系,导致潜在的攻击路径... 随着空管信息系统的智能化和开放化发展,风险暴露面正逐渐增大。威胁评估是有效评估空管信息系统脆弱性和安全风险的重要手段,但以往的威胁评估模型大多存在两方面的局限。一方面,通常只关注威胁信息的显性关联关系,导致潜在的攻击路径被忽视或未能被准确地分析;另一方面,在量化威胁时考虑的因素较为粗略,与实际系统环境脱节,导致威胁严重程度和实际情况不符。为此,提出一种基于知识图谱的空管信息系统威胁评估模型。将知识图谱本体模型范围扩展到资产安全属性、缓解措施和被攻陷资产等关键概念,充分融合资产、攻击、漏洞等多源威胁数据构建安全知识图谱,并设计逻辑推理规则弥补知识图谱描述能力的限制;提出推理规则融合广度优先策略的攻击路径识别算法,提取更加全面和准确的攻击路径和攻击关系;基于系统实际运行环境提出细粒度的威胁量化方法,考虑资产外部暴露程度、物理保护和网络防护等因素。实验表明该评估模型有助于识别空管信息系统中多漏洞联合利用形成的潜在攻击路径,同时根据威胁量化对攻击响应进行优先级排序,能有效提高网络安全防御效率。 展开更多
关键词 空管信息系统 知识图谱 推理规则 攻击路径 威胁评估
下载PDF
基于GATv2模型的虚假数据注入攻击检测方法
16
作者 罗小元 耿艺帆 +1 位作者 吴莉艳 王新宇 《电气工程学报》 CSCD 北大核心 2024年第3期353-361,共9页
虚假数据注入攻击(False data injection attack,FDIA)能够躲避传统不良数据检测器,给智能电网的稳定运行带来了挑战。因此,提出了一种基于改进图注意力网络(Graph attention network v2,GATv2)模型的FDIA检测方法。首先,基于电力系统... 虚假数据注入攻击(False data injection attack,FDIA)能够躲避传统不良数据检测器,给智能电网的稳定运行带来了挑战。因此,提出了一种基于改进图注意力网络(Graph attention network v2,GATv2)模型的FDIA检测方法。首先,基于电力系统结构和FDIA的特性,构建模型所需数据集;然后,根据电力系统的拓扑信息和运行信息建立图数据;设计基于GATv2的检测模型对电网图数据的空间特征进行提取,进而检测注入的虚假数据攻击;最后,在IEEE 14节点和IEEE 118节点系统上验证了GATv2模型的有效性,且仿真结果表明GATv2模型检测性能优于其他模型,检测准确率达到98%以上,在不同攻击节点数和不同攻击强度情况中都具有较好的鲁棒性。 展开更多
关键词 智能电网 虚假数据注入攻击 深度学习 图注意力网络 不良数据检测
下载PDF
基于漏洞信息和攻击图的信息路径风险评分系统
17
作者 董洋 历超 +1 位作者 杨英奎 王祝先 《自动化技术与应用》 2024年第10期122-125,130,共5页
基于漏洞信息和攻击图提出一种能够测量特定路径风险的信息路径风险评级系统。该方法使用通用漏洞评分系统(CVSS)以及节点和路径信息,通过执行保密性、完整性、可用性(CIA)的算法评估,并分析每个节点之间的漏洞相关性,计算出风险评分。... 基于漏洞信息和攻击图提出一种能够测量特定路径风险的信息路径风险评级系统。该方法使用通用漏洞评分系统(CVSS)以及节点和路径信息,通过执行保密性、完整性、可用性(CIA)的算法评估,并分析每个节点之间的漏洞相关性,计算出风险评分。在实验中,计算了CVSS分值、CIA分值以及节点和路径的风险评分,并与其他风险评分系统进行了比较。通过比较攻击路径风险找到了最具威胁的攻击路径。这证实了提出的方法计算网络攻击路径的风险,并根据风险评分有效地选择了攻击路径。使用此评分系统对特定网络中的信息系统进行量化安全管控。 展开更多
关键词 网络安全 漏洞信息 攻击图 评估系统 系统设计
下载PDF
基于知识图谱的网络攻击预测方法研究及应用 被引量:2
18
作者 黄智勇 刘昕宇 +2 位作者 林仁明 余雅宁 张凤荔 《现代电子技术》 北大核心 2024年第9期91-96,共6页
针对网络攻击知识图谱,同时引入了时序信息,提出一种基于知识图谱的网络攻击预测方案,并对其进行应用。通过对网络攻击知识图谱进行规则学习和应用,能够有效地得到网络攻击事件预测结果,为网络安全运维人员提供决策支持。以企业提供的... 针对网络攻击知识图谱,同时引入了时序信息,提出一种基于知识图谱的网络攻击预测方案,并对其进行应用。通过对网络攻击知识图谱进行规则学习和应用,能够有效地得到网络攻击事件预测结果,为网络安全运维人员提供决策支持。以企业提供的网络安全运维知识图谱为例,将文中研究的方法应用到企业安全检测系统,结果证明该方法具有充分的准确性和可行性,同时为后续研究提供了思路。 展开更多
关键词 网络安全 知识图谱 时序知识图谱 知识图谱推理 链接预测 网络攻击 随机游走 攻击规则
下载PDF
欺骗防御技术发展及其大语言模型应用探索 被引量:1
19
作者 王瑞 阳长江 +2 位作者 邓向东 刘园 田志宏 《计算机研究与发展》 EI CSCD 北大核心 2024年第5期1230-1249,共20页
欺骗防御作为主动防御中最具发展前景的技术,帮助防御者面对高隐蔽未知威胁化被动为主动,打破攻守间天然存在的不平衡局面.面对潜在的威胁场景,如何利用欺骗防御技术有效地帮助防御者做到预知威胁、感知威胁、诱捕威胁,均为目前需要解... 欺骗防御作为主动防御中最具发展前景的技术,帮助防御者面对高隐蔽未知威胁化被动为主动,打破攻守间天然存在的不平衡局面.面对潜在的威胁场景,如何利用欺骗防御技术有效地帮助防御者做到预知威胁、感知威胁、诱捕威胁,均为目前需要解决的关键问题.博弈理论与攻击图模型在主动防御策略制定、潜在风险分析等方面提供了有力支撑,总结回顾了近年来二者在欺骗防御中的相关工作.随着大模型技术的快速发展,大模型与网络安全领域的结合也愈加紧密,通过对传统欺骗防御技术的回顾,提出了一种基于大模型的智能化外网蜜点生成技术,实验分析验证了外网蜜点捕获网络威胁的有效性,与传统Web蜜罐相比较,在仿真性、稳定性与灵活性等方面均有所提升.为增强蜜点间协同合作、提升对攻击威胁的探查与感知能力,提出蜜阵的概念.针对如何利用蜜点和蜜阵技术,对构建集威胁预测、威胁感知和威胁诱捕为一体的主动防御机制进行了展望. 展开更多
关键词 欺骗防御 大语言模型 攻击图 博弈论 蜜点 蜜阵
下载PDF
因果图表征的网络攻击数据集构建
20
作者 朱光明 冯家伟 +4 位作者 卢梓杰 张向东 张锋军 牛作元 张亮 《计算机技术与发展》 2024年第4期124-131,共8页
高级可持续威胁攻击因其多阶段可持续的特性,已经成为现阶段网络攻击的主要形式。针对此类型攻击的检测、预测研究,不可避免地需要相关数据集的支撑。在构建数据集时,往往需要真实的网络与主机数据。但出于隐私与安全的考虑,很少有满足... 高级可持续威胁攻击因其多阶段可持续的特性,已经成为现阶段网络攻击的主要形式。针对此类型攻击的检测、预测研究,不可避免地需要相关数据集的支撑。在构建数据集时,往往需要真实的网络与主机数据。但出于隐私与安全的考虑,很少有满足要求的开源数据集。现有的数据集也往往只提供原始的网络流和日志数据,对长时攻击上下文解析的缺乏导致单纯地利用神经网络进行数据包的恶性甄别和预测的实用性不足。为了解决这些问题,该文基于网络环境的真实攻击过程数据,构建并公布了一个基于因果图的网络攻击数据集。与传统的原始网络流和日志数据集相比,该数据集充分挖掘了攻击上下文中的因果关系,可以跨长时域对高级可持续威胁攻击进行建模,方便研究人员进行攻击检测与预测的研究。该数据集开源在https://github.com/GuangmingZhu/CausalGraphAPTDataset上。 展开更多
关键词 网络安全 因果图 高级可持续威胁攻击 攻击上下文
下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部