期刊文献+

计算机网络攻防建模仿真研究综述 被引量:10

Overview of Modeling and Simulation of Attack and Defense of Computer Network
在线阅读 下载PDF
导出
摘要 由于实际计算机网络应用的敏感性、实时性和大尺度特性,不方便直接在上开展研究工作,利用建模仿真方法研究计算机网络攻防安全,不仅可以避免对实际计算机网络的影响和破坏,而且具有灵活性、可重复性、费效比低等优点,可为计算机网络实际安全提供有效参考。从基于图形分析和基于网络蠕虫行为分析两个方面综述了国内外有关计算机网络攻防行为的建模方法及其特点;分析了基于级联失效的计算机网络攻防效果分析方法和面向安全评估的计算机网络攻防建模仿真系统;最后,对计算机网络攻防建模的难点和不足做出了分析,并对今后的发展趋势进行了预测。 Because of the sensitivity, real-time and large-scale of computer network applications, it is is hard to make the research work directly. Using the methods of modeling and simulation to analyze computer network security is a good way. These methods not only can avoid affecting and destroying actual computer networks, but also are flexi- ble, repeatable and high-efficiency. At first, the related work on the methods of modeling and simulation of network attack and defense based on analysis of graph and network worm behaviors was presented. And then the effect evalua- tion methods of network attack and defense based on cascading failure were analyzed, and some typical systems facing the analyzing of network security were introduced. In the end, the problems and challenges of current research were discussed and some suggestions for future research were put forward.
出处 《计算机仿真》 CSCD 北大核心 2013年第11期1-5,19,共6页 Computer Simulation
基金 国家自然科学基金(61273189 61174156) 2012全军军事类研究生资助课题(2012JY003-065)
关键词 计算机网络 建模仿真 网络攻防 网络安全 Computer network Modeling and simulation Network attack and defense Network security
  • 相关文献

参考文献40

  • 1代廷合,吴开贵.攻击树在多层网络攻击模型中的应用[J].网络安全技术与应用,2009(1):75-76. 被引量:6
  • 2王国玉,王会梅,陈志杰,鲜明.基于攻击图的计算机网络攻击建模方法[J].国防科技大学学报,2009,31(4):74-80. 被引量:22
  • 3S Bistarelli, F Fioravanti, P Peretti, Using CP-nets as a Guide for Countermeasure Selection [ C ]. Proceedings of the 2007 ACM sym- posium on Applied computing, Seoul, Korea, 2007:300:304.
  • 4C Onwubiko, A P Lenaghan, L Hebbes. An Improved Worm Miti- gation Model for Evaluating the Spread of Aggressive Network Worms[J]. EUROCON, 2005.
  • 5Su Fei, Lin Zhaowen, Ma Yan. Worm Propagation Modeling based on Two-Factor Model[C]. In: Pro. Of the IEEE, 2009, 978-1- 4244-3693 -4/09.
  • 6邓洁,段海新.基于SSFNet的蠕虫传播细粒度建模与仿真[J].小型微型计算机系统,2008,29(1):145-149. 被引量:8
  • 7Andjelka Kelic, DrakeE Warren and Laurence R Phillips. Cyber and Physical Infrastructure Interdependencies [ R ]. SANDIA RE- PORT SAND 2008-6192, September 2008.
  • 8Barbara McQuiston, Michael VanPutte. National Cyber Range [R]. DARPA, 2010.
  • 9NETWARS Model Development Guide ( Version 3.0 ) [ S ]. De- fense Information System Agency & NETWARS Program Manage- ment Office, 2007.
  • 10L Williams, R Lippmann and K W Ingols. Garnet: A graphical attack graph and reachability network evaluation tool [ C ]. In Proc. of VizSEC, 2008.

二级参考文献182

共引文献145

同被引文献31

引证文献10

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部