期刊文献+

基于模拟攻击的网络安全风险评估研究 被引量:1

Network Security Risk Assessment Based on Simulation Attacks
在线阅读 下载PDF
导出
摘要 提出了一种基于模拟攻击的网络安全风险评估分析方法.在提取目标系统及其脆弱性信息和攻击行为特征的基础上,模拟攻击者的入侵状态改变过程,生成攻击状态图,并给出其生成算法.研究了利用攻击状态图对网络系统安全进行评估的方法.提出了一种新的评估系统的设计方案,给出评估系统的总体框架结构及各模块功能组成。 The novel network security risk analysis model is proposed based on simulation attacks. First, the information about 'target network and the vulnerable information is studied and described. By correlating the system' s vulnerabilities and attacker's behaviors, attack state graph was introduced, and its generating algorithm presented. Then a new network vulnerability evaluation system is studied and designed based on attack graph modeling method. The block scheme of the computer network vulnerability evaluation system is proposed.The function and structure of all modules are analyzed.
出处 《微计算机信息》 2009年第18期45-46,29,共3页 Control & Automation
关键词 网络安全 模拟攻击 攻击状态图 风险评估 network security attack simulating state graph risk assessment
  • 相关文献

参考文献8

二级参考文献69

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2王前,余静,陈性元,谢寿生.安全隐患检测系统的设计与实现[J].微计算机信息,2005,21(10X):3-4. 被引量:5
  • 3[1]Tim B. Multisensor data fusion for next generation distributed intrusion detection systems[A]. 1999 IRIS National Symposium on Sensor and Data Fusion, Laurel,USA,1999.
  • 4[2]Tim B. Intrusion systems and multisensor data fusion: creating cyberspace situational awareness[J]. Communications of the ACM, 2000, 43(4): 99~105.
  • 5[3]Martin R, Chris G.Snort users manual, Snort release 2.0.0[EB/OL].http://www.snort.org/docs/SnortUsersManual.pdf,2002-07-06.
  • 6[4]Tim B, Roger R. Defense-in-depth revisited:qualitative risk analysis methodology for complex network-centric operations[EB/OL].http://www.silkroad.com/papers/pdf/archives/defense-in-depth-revisited-original.pdf,2002-07-23.
  • 7[5]Honeynet Project.Know your enemy: statistics[EB/OL].http://www.HoneyNet.org/papers/stats/, 2001-07-22.
  • 8Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996
  • 9Longley D. , Shain M. , Caelli W.. Information Security: Dictionary of Concepts, Standards and Terms. New York: Macmillan, 1992
  • 10Beizer B.. Software Testing Techniques. 2nd edition. International Thomson Computer Press, 1990

共引文献279

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部