In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in ...In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage.Besides,an algorithm of searching attack path was also obtained in accordence with its definition.Finally,an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree,the weight distribution information,and the attack paths.An example threat tree is given to verify the effectiveness of the algorithms.展开更多
以模糊Petri网(Fuzzy Petri net,FPN)理论为基础,定义了一种面向检测的新型网络攻击模型FPAN,提出了FPAN的生成算法,并通过实验验证了算法的正确性,该模型比攻击树(Attack Tree)更能够反映各个步骤之间的关系,可重用性也更强,具有较好...以模糊Petri网(Fuzzy Petri net,FPN)理论为基础,定义了一种面向检测的新型网络攻击模型FPAN,提出了FPAN的生成算法,并通过实验验证了算法的正确性,该模型比攻击树(Attack Tree)更能够反映各个步骤之间的关系,可重用性也更强,具有较好的实用性。展开更多
基金Supported by National Natural Science Foundation of China (No.90718023)National High-Tech Research and Development Program of China (No.2007AA01Z130)
文摘In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage.Besides,an algorithm of searching attack path was also obtained in accordence with its definition.Finally,an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree,the weight distribution information,and the attack paths.An example threat tree is given to verify the effectiveness of the algorithms.