[1]李玲娟 孙光辉.网络攻击图生成算法研究[J].计算机技术与发展,2010,(10):171-175.
 LI Ling-juan,SUN Guang-hui.Research on Algorithm of Generating Network Attack Graph[J].,2010,(10):171-175.
点击复制

网络攻击图生成算法研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2010年10期
页码:
171-175
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Research on Algorithm of Generating Network Attack Graph
文章编号:
1673-629X(2010)10-0171-05
作者:
李玲娟 孙光辉
南京邮电大学计算机学院
Author(s):
LI Ling-juanSUN Guang-hui
College of Computer,Nanjing University of Posts and Telecommunications
关键词:
攻击模型攻击图状态转移攻击代价分析
Keywords:
attack model attack graph state transition attack costs analysis
分类号:
TP393
文献标志码:
A
摘要:
攻击模型能够对攻击过程进行结构化描述和有效分析,攻击图可以清楚地分析攻击者可能采取的攻击路径,两者对网络安全策略的制定具有重要的指导意义。设计了一种基于状态转移的网络攻击模型,并基于该模型设计了攻击图生成系统的架构和相应的攻击图生成算法,在攻击图生成算法中引入了代价分析机制和规模控制机制。仿真实验结果表明,利用所设计的模型和算法不仅能有效地预测攻击者可能采用的各种攻击路径和最佳攻击路径,而且能有效地控制攻击图的规模
Abstract:
Attack model can help structurally describing and effectively analyzing the course of attack,and attack graph can clearly analyze the attack paths the attacker may take.Both of them play the guiding role for the establishment of network security policy.A network attack model based on state transition is designed,and a framework of the attack graph generation system as well as the algorithm of generating the attack graph is also designed.In the algorithm,attack costs are analyzed,and the method of controlling the graph size is adopted.The experiment result shows that the possible attack paths as well as the best attack path can be effectively doped out by the model and algorithm, and the graph size can also be controlled by them

相似文献/References:

[1]吴杨 矫文成 潘艳辉 李华.卫星网络加密算法安全性分析与攻击建模[J].计算机技术与发展,2011,(06):140.
 WU Yang,JIAO Wen-cheng,PAN Yan-hui,et al.Analysis of Cipher Security and Cipher Attack Modeling in Satellite Network[J].,2011,(10):140.
[2]陈翊璐,王子博,张耀方,等.面向流程工业系统的关键攻击步骤识别[J].计算机技术与发展,2024,34(02):105.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 016]
 CHEN Yi-lu,WANG Zi-bo,ZHANG Yao-fang,et al.Identification of Critical Attack Step for Process Industrial Systems[J].,2024,34(10):105.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 016]
[3]马荟平,李 鹏,肖 航,等.基于贝叶斯攻击图的 RFID 系统安全评估模型[J].计算机技术与发展,2024,34(02):113.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 017]
 MA Hui-ping,LI Peng,XIAO Hang,et al.RFID System Security Evaluation Model Based on Bayesian Attack Graph[J].,2024,34(10):113.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 017]

备注/Memo

备注/Memo:
国家863计划(2006AA01Z439); 江苏省高校自然科学基础研究项目(08KJB620002); 南京邮电大学校科研基金(NY207051)李玲娟(1963-),女,辽宁辽阳人,教授,研究方向为数据挖掘、网络安全等
更新日期/Last Update: 1900-01-01