期刊文献+

基于攻击图的计算机网络攻击建模方法 被引量:22

Research on Computer Network Attack Modeling Based on Attack Graph
在线阅读 下载PDF
导出
摘要 随着计算机网络入侵技术的不断发展,网络攻击行为表现出不确定性、复杂性和多样性等特点,攻击向大规模、协同化和多层次方向发展,计算机网络攻击建模已成为当前研究的热点。综合论述计算机网络攻击建模的研究概况,剖析网络攻击图的定义,讨论现有的典型网络攻击图的主要生成方法并对其进行复杂性分析,在此基础上归纳总结目前网络攻击图的应用。给出网络攻击图研究的若干热点问题与展望。 With the development of the intrusion technology and the uncertainty, complexity and diversity character of the network attack, the next direction will be characterized as large scale, collaboration and multilayered. As a result, modeling of network attack has been the focus of attention. In the current study, firstly, the research background of modeling of network attack and the concept of attack graph are presented. Then the represented network attack graph generating method and its algorithmic complexity are discussed. Finally, the application of network attack graph is given. In conclusion, some major problems and research trends in this area are addressed.
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2009年第4期74-80,共7页 Journal of National University of Defense Technology
关键词 网络攻击 攻击图 攻击建模 network attack attack graph attack modeling
  • 相关文献

参考文献33

  • 1Cunningham W H. Optimal Attack and Reinforcement of a Network [J] .Journal of the ACM (JACM), 1985, 32(3): 549- 561.
  • 2Kuang R B. Rule Based Security Checking[R]. Technical Report, MIT lab for Computer Science, 1994.
  • 3Swiler L P, Phillips C, Gaylor T.A Graph Based Network Vulnerability Analysis System, SAND97- 3010/1[R]. Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, 1998.
  • 4Ritchey R W, AmmannP. Using Model Checking to Analyze Network Vulnerabilities[ C]//Proceedings of the IEEE Computer Society Syraposium on Security and Privacy(S&P 2000), Oakland, California, 2000:156 - 165.
  • 5Jha S, Sheyner O, Wing J. Two Formal Analyses of Attack Graphs[ C]//Proceedings of the 15^th IEEE Computer Security Foundations Workshop (CSFW'15), Cape Breton, Nova Scotia, Canada, 2002: 49-63,.
  • 6Sheyner O, Haines J, Jha S, et al. Automated Generation and Analysis of Attack Graphs[ C]//Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P 2002), Oakland, California, 2002: 254- 265.
  • 7Ammann P, Wijesekem D, Kaushik S. Scalable, Graph-based Network Vulnerability Analysis[C]//Proceedings of the 9^th ACM Conference on Computer and Communications Security (CCS'02), Washington DC, ACM, 2002: 217-224.
  • 8Zhang T, Hu M Z, Li D, et al. An Effective Method to Generate Attack Graph [J]. Machine Learning and Cybernetics, 2005:3926- 3931.
  • 9Danforth M. Models for Threat Assessment in Networks [ D]. University of Califomia-davis, 2006.
  • 10Ingols K, Lippmann R, Keith P. Practical Attack Graph Generation for Network Defense [C]//Computer Security-ity Applications Conference, ACSAC apos, 06.22nd Annual Volume, Issue, Dec. 2006:121 - 130.

二级参考文献9

  • 1汪立东.[D].哈尔滨工业大学,2002.
  • 2ASLAM T, KRSUL I, SPAFFORD E H. Use of a taxonomy of security faults[A]. The 19th National Information System Security Conference [C]. Baltimore, Maryland, 1996. 22-25.
  • 3KRSUL I V. Software Vulnerability Analysis[D]. Purdue University, West Lafayette, USA, 1998.
  • 4BISHOP M, BAILEY D. A Critical Analysis of Vulnerability Taxonomies[R]. Technical Report CSE-96-11, Department of Computer Science, University of California, Davis, 1996.
  • 5KNIGHT E, HARTLEY B V. Is your network inviting an attack[J]. Internet Security Advisor, 2000(5/6): 2-5.
  • 6JIWNANI K, ZELKOWITZ M. Maintaining software with a security perspective[A]. ICSM'02[C]. Montréal, 2002. 194-203.
  • 7GLASS R L, VESSEY I. Contemporary application-domain taxonomies[J]. IEEE Software, 1995, 12 (4): 63-76.
  • 8LONGSTAFF T. Update: CERT/CC vulnerability knowledgebase[A]. Technical Presentation at a DARPA Workshop[C]. Savannah, Georgia, 1997.
  • 9单国栋,戴英侠,王航.计算机漏洞分类研究[J].计算机工程,2002,28(10):3-6. 被引量:58

共引文献36

同被引文献221

引证文献22

二级引证文献87

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部