摘要
由于实际计算机网络应用的敏感性、实时性和大尺度特性,不方便直接在上开展研究工作,利用建模仿真方法研究计算机网络攻防安全,不仅可以避免对实际计算机网络的影响和破坏,而且具有灵活性、可重复性、费效比低等优点,可为计算机网络实际安全提供有效参考。从基于图形分析和基于网络蠕虫行为分析两个方面综述了国内外有关计算机网络攻防行为的建模方法及其特点;分析了基于级联失效的计算机网络攻防效果分析方法和面向安全评估的计算机网络攻防建模仿真系统;最后,对计算机网络攻防建模的难点和不足做出了分析,并对今后的发展趋势进行了预测。
Because of the sensitivity, real-time and large-scale of computer network applications, it is is hard to make the research work directly. Using the methods of modeling and simulation to analyze computer network security is a good way. These methods not only can avoid affecting and destroying actual computer networks, but also are flexi- ble, repeatable and high-efficiency. At first, the related work on the methods of modeling and simulation of network attack and defense based on analysis of graph and network worm behaviors was presented. And then the effect evalua- tion methods of network attack and defense based on cascading failure were analyzed, and some typical systems facing the analyzing of network security were introduced. In the end, the problems and challenges of current research were discussed and some suggestions for future research were put forward.
出处
《计算机仿真》
CSCD
北大核心
2013年第11期1-5,19,共6页
Computer Simulation
基金
国家自然科学基金(61273189
61174156)
2012全军军事类研究生资助课题(2012JY003-065)
关键词
计算机网络
建模仿真
网络攻防
网络安全
Computer network
Modeling and simulation
Network attack and defense
Network security