期刊文献+

面向攻防演练的计算机网络防御描述语言研究 被引量:1

Computer network defense description language for attack and defense exercise
在线阅读 下载PDF
导出
摘要 给出一种面向攻防演练的计算机网络防御系统的设计,此系统用计算机网络防御描述语言(CNDDL)描述。针对PDRR模型,CNDDL语言能够将攻防演练中的防御想定转化成保护、检测、响应和恢复等措施及防御逻辑,由解释器进行解释、执行,并部署在平台中。在GTNetS仿真平台中的试验表明,此系统能够实现ACL访问控制功能、对特定攻击进行检测的功能、系统是否对攻击做出响应及恢复的功能,从而为计算机网络攻防模拟演练提供防御支持。 A computer network defense system is designed by computer network defense description language. CNDDL can describe protection, detection, response and recovery measures based on PDRR model. By interpreting, the measures is implemented in the platform. Experiments in GTNetS platform indicated that CND system using CNDDL can describe ACL (access control list) of protection measures, IDS detection command for detection measures, response or not for response measures, recovery information for recovery measures. The above information shows that CND system can provide defense support for computer network attack and defend simulation,
出处 《计算机工程与设计》 CSCD 北大核心 2008年第1期18-20,24,共4页 Computer Engineering and Design
基金 航空科学基金项目(03F51060) 北京教育委员会共建项目建设计划基金项目(SYS100060412) 国防基础科研项目基金项目
关键词 计算机网络防御 攻防演练 计算机网络防御描述语言 PDRR模型 GTNETS computer network defense (CND) attack and defense exercise computer network defense description language (CNDDL) PDRR model GTNetS
  • 相关文献

参考文献8

  • 1[1]DoD Directive O-8530.1,Computer network defense[S].
  • 2[2]Breslau L.Advances in network simulation[J].IEEE Computer,2000,33(5):59-67.
  • 3[3]Brown BilI,Cutts Andrew,McGrath Dennis,et al.Simulation of eyber attacks with applications in homeland defense training[J].Proceedings of the SPIE,2003,5071:63-71.
  • 4[4]DeLooze L L,McKean P J,Graig C.Ineorporating simulation into the computer[EB/OL].http://fie.engrng.pitt.edu/fie2004/papers/1575.pdf,2001.
  • 5[5]Michael Liljenstam,Liu Jason,David Nicol,et al.Rinse:The real-time immersive network simulation environment for network security exercises[C].Monterey,CA:Proceedings of the Workshop on Principles of Advanced and Distributed Simula-tion,2005:119-128.
  • 6[7]Matthew Condell,Charles Lynn,John Zan.Seeurity policy speci-fication language[EB/OL].http://www.ietf.org/internet-.drafts/ draft-ietf-ipsp-spsl-00.txt,2000.
  • 7夏春和,李肖坚,赵沁平.基于入侵诱骗的网络动态防御研究[J].计算机学报,2004,27(12):1585-1592. 被引量:6
  • 8[10]GTNetS[EB/OL].http://www.ece.gatech.edu/research/labs/ MANIACS/GTNetS/.

二级参考文献16

  • 1Hu Chang-Zhen. Research on network intrusion detection false fault. In: Proceedings of the 3th Research and Discussion of China Information Security Development and Stratagem, Beijing, 2003(in Chinese)(胡昌振.网络入侵检测误警问题研究.见:第3届中国信息安全发展趋势与战略高层研讨会文集,北京,2003)
  • 2Tang Zheng-Jun. Design and implement of Network intrusion system. Beijing: Publish House of Electronics Industry, 2002(in Chinese)(唐正军等编.网络入侵检测系统的设计与实现. 北京:电子工业工业出版社,2002)
  • 3Frank J.. Machine learning and intrusion detection: Current and future directions. In: Proceedings of the 17th National Computer Security Conference, 1994. http://seclab.cs.ucdavis.edu/papers/ncsc.94.ps
  • 4Kumar Sandeep. Classification and detection of computer intrusions[Ph.D. dissertation]. Purdue University, 1995
  • 5http://www.cs.ucsb.edu/kemm/NetSTAT/documents.html
  • 6Warrender Christina, Forrest Stephanie, Pearlmutter Barak. Detecting intrusions using system calls: Alternative data models. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, USA, 1998, 133~145
  • 7USTAT November. A Real-time Intrusion Detection System for UNIX. http://www.cs.ucsb.edu/TRs/techreports/TRCS93-26.ps, 1992
  • 8Ilgun Koral. Ustat: A real-time intrusion detection system for unix. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, USA, 1992, 16~40
  • 9Anderson Debra, Lunt Teresa F., Javitz Harold, Tamaru Ann, Valdes Alfonso. Detecting unusual program behavior using the statistical component of the next-generation expert system(NIDES). Computer Science Laboratory, SRI International, Menlo Park, CA, USA: Technical Report SRI-CSL-95-06, 1995
  • 10Lunt T.F., Tamaru A., Gilham F. et al.. A Real-time intrusion detection expert system(IDES). Computer Science Laboratory SRI International, Menlo Park, California: Technical Report, 1992

共引文献5

同被引文献1

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部