期刊文献+

基于智能代理和攻击树的自动攻击系统研究 被引量:1

Research on Auto-Attack System based on Agent and Attack Tree
在线阅读 下载PDF
导出
摘要 网络攻击大多数情况下是利用相对独立的工具(或软件)实施,其实施的范围、速度和效果都有较大的限制。文章基于智能代理和攻击树理论提出一种大范围、多类型的自动攻击模型。该模型系统级采用代理技术,支持系统插件动态扩充,在攻击模式上采用攻击树描述攻击流程实现攻击过程的自动化,同时构建控管中心实现系统的统一管理和控制。实验结果表明,系统对多目标同时发起攻击,用户设计流程执行成功率高,攻击代理端CPU占用率低,攻击效率获得提升。该攻击模型可以实现多目标、多形式的自动攻击,攻击范围广,可人工限定攻击速度和设计攻击流程,模型具有较高的普适性,实现的系统可作为信息安全测评工具和实验平台。 In most cases, network attacks is implemented by attackers with relatively independent tools (or software), the scope, speed and effect of attack were very limited. This paper proposes a large-scale, multi-type auto-attack model based on agent technology and attack tree theory. The system level of the model employs the agent technology, supports the dynamic expansion of the plugins and reaches the auto-attack by describing the attack procedure with attack tree. Meanwhile, the control center was built to achieve unified management and control of the whole system. The experiment shows that the system can attack multi-objective at the same time, reach a high success rate of the procedure execution, achieve a low CPU utilization at attack agent and obtain a great promotion in the attack efficiency. The attack model can achieve multi-objective and multi-type auto-attack. It has a high universality and can be used as an information security assessment tool or experimental platform.
作者 冯帆 罗森林
出处 《信息网络安全》 2013年第1期44-48,共5页 Netinfo Security
关键词 网络自动攻击 攻击树 智能代理 信息安全 network auto-attack attack tree agent information security
  • 相关文献

参考文献7

二级参考文献38

  • 1张永,陆余良.攻击树在多阶段入侵检测系统中的应用[J].计算机应用与软件,2004,21(8):103-105. 被引量:3
  • 2秦嵘,张尧弼.基于攻击树的协同入侵建模[J].计算机应用与软件,2005,22(4):116-118. 被引量:5
  • 3李娜.可信计算与内网安全[J].计算机安全,2005(10):7-9. 被引量:4
  • 4樊莉,刘志勤,赵玖玲.构建军事信息系统安全体系的研究[J].网络安全技术与应用,2005(10):59-61. 被引量:2
  • 5庄朝晖.基于攻击树的多层次入侵检测及其在Linux上的原型[硕士学位论文].厦门:厦门大学,2002-05.
  • 6B Schneier.Attack Trees:Modeling Security Threats[J].Dr Dobb's Journal, 1999.
  • 7G Helmer,J Wong,Mark Slagell et al.A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System[C].In:Symposium on Requirements Engineering for Information Security,2001-03.
  • 8M Howard,D LeBlanc.Writing Secure Code[M].Microsoft Press,2001.
  • 9F Moberg.Security Analysis of an Information System Using an Attack Tree-Based Methodology[D].Master's Thesis.Department of Computer Engineering,Chalmers University of Technology,Sweden,2000.
  • 10A P Moore,R J Ellison,R C Linger.Attack Modeling for Information Security and Survivability,CMU SEI Technical Note,2001-03.

共引文献39

同被引文献3

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部