期刊文献+

网络攻击图生成方法研究 被引量:7

Study on the method to generate network attack graphs
在线阅读 下载PDF
导出
摘要 针对网络安全分析研究的要求,在已有研究的基础上,提出了一种灵活的网络攻击图生成方法。首先通过分析网络主机、用户权限、主机之间的连接关系和攻击等安全属性,建立了一个面向网络安全分析的安全模型,然后使用广度优先的正向搜索算法生成攻击路径,实现了网络攻击图的生成。通过实验和比较证明,该方法具有更高的有效性和更快的攻击图生成速度。 Mining at the requirement of network security analysis, a flexible method to generate attack graph is presented. After analyzing network security attributes including the host, user privilege, connection relation, etc., the network security model is built, and the model could describe the network security status. A forward-search, breadth-first algorithm is used to produce attack route, and utilize the tools Graphviz to generate the attack graph. The experiment validate that our method is feasible.
出处 《高技术通讯》 CAS CSCD 北大核心 2006年第4期348-352,共5页 Chinese High Technology Letters
基金 国家自然科学基金(60403033)和国防十五预研(41315.7.1)资助项目.
关键词 网络安全 安全分析 网络攻击图 攻击 network security, security analysis, network attack graph, attack
  • 相关文献

参考文献7

  • 1Ramakrishnan C,Sekar R.Model-based analysis of configuration vulnerabilities.Journal of Computer Security,2002,10(1-2):189-209.
  • 2Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities.In:Proceedings of the IEEE Symposium on Security and Privacy,Washington.May2001:156-165.
  • 3Sheyner O,Haines J,Jha S,et al.Automated generation and analysis of attack graphs.In:Proceedings of IEEE Symposium on Security and Privacy,Oakland.May 2002:273-284.
  • 4Sheyner O.Scenario graphs and attack graphs:[Ph.D Thesis].Pittsburgh:School of Computer Science Carnegie Mellon University,2004.
  • 5张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 6Ritchey R,Oberry B,Noel S.Representing TCP/IP connectivity for topological analysis of network security.In:Proceeding of 18th Annual Computer Security Applications Conference,Las Vegas,Nevada.December 2002:25-31.
  • 7Graphviz.http://www.graphviz.org/pub/graphviz/ARCHIVE/graphviz-1.12-1.i386.rpm,2005.

二级参考文献9

  • 1汪立东.[D].哈尔滨工业大学,2002.
  • 2ASLAM T, KRSUL I, SPAFFORD E H. Use of a taxonomy of security faults[A]. The 19th National Information System Security Conference [C]. Baltimore, Maryland, 1996. 22-25.
  • 3KRSUL I V. Software Vulnerability Analysis[D]. Purdue University, West Lafayette, USA, 1998.
  • 4BISHOP M, BAILEY D. A Critical Analysis of Vulnerability Taxonomies[R]. Technical Report CSE-96-11, Department of Computer Science, University of California, Davis, 1996.
  • 5KNIGHT E, HARTLEY B V. Is your network inviting an attack[J]. Internet Security Advisor, 2000(5/6): 2-5.
  • 6JIWNANI K, ZELKOWITZ M. Maintaining software with a security perspective[A]. ICSM'02[C]. Montréal, 2002. 194-203.
  • 7GLASS R L, VESSEY I. Contemporary application-domain taxonomies[J]. IEEE Software, 1995, 12 (4): 63-76.
  • 8LONGSTAFF T. Update: CERT/CC vulnerability knowledgebase[A]. Technical Presentation at a DARPA Workshop[C]. Savannah, Georgia, 1997.
  • 9单国栋,戴英侠,王航.计算机漏洞分类研究[J].计算机工程,2002,28(10):3-6. 被引量:58

共引文献34

同被引文献40

引证文献7

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部