期刊文献+

基于攻击模式的广度搜索攻击图生成算法 被引量:2

Attack Graph Generation Algorithm Based on Attack Mode Breadth Search
在线阅读 下载PDF
导出
摘要 网络攻击者一旦发生攻击行为,通常希望攻击行为能危害到最大范围,基于这一前提,依据广度优先搜索策略及属性攻击图模型,提出了基于攻击模式的广度搜索攻击图的生成算法,算法可以很快的生成攻击图并且规模明显减小,最后对该算法的性能进行了分析和实验分析。 When network attacker once attacks,he or she usually hopes that the aggressive behavior can be harmful to the maximum extent,based on the premises,in accordance with the breadth-first search strategies and attribute attack graph model,the breadth search attack graph generation algorithm based on attack mode is forwarded,the algorithm can quickly generate the attack graph and the scale is significantly reduced,finally,the performance of the algorithm is analyzed and experimental analysis for it is conducted.
作者 吴淑语 李波
出处 《重庆工商大学学报(自然科学版)》 2012年第12期44-48,共5页 Journal of Chongqing Technology and Business University:Natural Science Edition
基金 重庆市教委科技项目资助(KJ110831)
关键词 广度搜索 攻击图 网络安全 breadth of the search attack graph network security
  • 相关文献

参考文献7

  • 1赵芳芳,陈秀真,李建华.基于权限提升的网络攻击图生成方法[J].计算机工程,2008,34(23):158-160. 被引量:14
  • 2苘大鹏,周渊,杨武,杨永田.用于评估网络整体安全性的攻击图生成方法[J].通信学报,2009,30(3):1-5. 被引量:21
  • 3张静,陈新岗,向险峰.自动化技术在评审系统中的应用[J].四川兵工学报,2010,31(5):100-102. 被引量:2
  • 4SWILER L P,PHILLIPS C. A Graph-based System for Netwodc Vulnerability Analysis Report[ C ] //Proc, of ACM Workshop on New Security Paradigms. [ S. 1. ] :ACM Pmss,2008.
  • 5AMMANN P, WIJESEKERA D, KAUSHIK S. Scalahle Cmaph-based NetworkVulnerability Analysis[ C ]//Proc, of ACM Confen: nce on Computer and Communications Security. [ S. L] :ACM Press,2002:217-224.
  • 6KYLE I, RICHARD L. KEITH P. Practical Attack Graph Generation for Network Defense [ C ]//Proc. of Annual Computer Security Applications Conference. Miami Beach,USA: [ s. n. ] ,2006:121- 130.
  • 7INGOLS K, LIPPMANN R, PIWOWARSKI K. Practical Attack Graph Generation for Network Defense [ J ]. Computer Security Applications Conference ,2006 : 121-130.

二级参考文献16

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2Sheyner O, Wing J M. Tools for Generating and Analyzing Attack Graphs[C]//Proceedings of Workshop on Formal Methods for Components and Objects. Tehran, Iran: [s. n.], 2004.
  • 3Ammann P, Wijesekera D, Kaushik S. Scalable, Graph-based Network Vulnerability Analysis[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2002.
  • 4Ou Xinming, Govindavajhala S, Appel A W. A Logic-based Network Security Analyzer[C]//Proc. of the 14th USENIX Security Symposium. Berkeley, USA: USENIX Association, 2005.
  • 5Ritchey R, O'Berry B, Noel S. Representing TCP/IP Connectivity for Topological Analysis of Network Security[C]//Proceedings of the 18th Annual Computer Security Applications Conference. Washington, USA: IEEE Computer Society, 2002.
  • 6PHILLIPS C, SWILER L E A graph-based system for network vulnerability analysis[A]. Proc 1998 Workshop on New Security Paradigms[C]. Virginia, USA, 1998.71-79.
  • 7RITCHEY R W, AMMANN E Using model checking to analyze network vulnerabilities[A]. Proc 2001 IEEE Symposium on Security and Privacy[C]. Oakland, California, USA, 2001.156-165.
  • 8SHEYNER O, HAINES J, JHA S. Automated generation and analysis of attack graphs[A]. Proc 2002 IEEE Symposium on Security and Privacy[C]. Oakland, California, USA, 2002.254-265
  • 9AMMANN P, WIJESEKERA D, KAUSHIK S. Scalable, graph-based network vulnerability analysis[A]. Proc the 9th ACM Conference on Computer and Communications Security[C]. Washington, DC, USA, 2002.217-224.
  • 10SHAHRIARI H R, JALILI R. Modeling and analyzing network vulnerabilities via a logic-based approach[A]. Proc the 2nd International Symposium of Telecommunications (IST2005)[C]. Shiraz, Iran, 2005.13-21.

共引文献31

同被引文献31

  • 1苘大鹏,张冰,周渊,杨武,杨永田.一种深度优先的攻击图生成方法[J].吉林大学学报(工学版),2009,39(2):446-452. 被引量:23
  • 2张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 3Zhang L, Tang H, Cui Y, et al. Network security evalua- tion through attack graph generation [ J ]. World Academy of Science, Engineering and Technology, 2009,54 ( 1 ) : 412-416.
  • 4Khaitan S, Raheja S. Finding optimal attack path using attack graphs:a survey [ J ]. International Journal of Soft Computing and Engineering,2011,1 ( 3 ) :33-36.
  • 5Chen F, Liu D, Zhang Y, et al. A scalable approach to analyzing network security using compact attack graphs [ J ]. Journal of Networks, 201 O, 5 ( 5 ) : 543-550.
  • 6Wang C, Du N ,Yang H. Generation and analysis of attack graphs [ J ]. Procedia Engineering, 2012,29:4053 -4057.
  • 7Liu Z,Li S, He J, et al. Complex network security analysis based on attack graph model[ C ]//Sun S, Guo S, Yu F,etal. Second International Conference on Instrumentation, Measurement, Computer, Communication and Control ( IMC- CC) ,2012. Los Alamitos :IEEE,2012 : 183-186.
  • 8Phillips C, Swiler L P. A graph-based system for network- vulnerability analysis [ C ]//Bob Blakeley, Darrell Kien- zle,Mary Ellen Zurko. Proceedings of the 1998 workshop on New security paradigms. New York :ACM, 1998:71-79.
  • 9Swiler L P, Phillips C, Ellis D, et al. Computer-attack graph generation tool [ C ]//Frances M. Titsworth. DAR- PA Information Survivability Conference & Exposition II,2001. DISCEXO1. Proceedings. Los Alamitos: IEEE, 2001,2 : 307-321.
  • 10Ritchey R W, Ammann P. Using model checking to ana- lyze network vulnerabilities[ C]//Frances M. Titsworth. Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on. Los Alamitos : IEEE, 2000 : 156-165.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部