期刊文献+
共找到478篇文章
< 1 2 24 >
每页显示 20 50 100
Exploring Attack Graphs for Security Risk Assessment: A Probabilistic Approach 被引量:1
1
作者 GAO Ni HE Yiyue 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第2期171-177,共7页
The attack graph methodology can be used to identify the potential attack paths that an attack can propagate. A risk assessment model based on Bayesian attack graph is presented in this paper. Firstly, attack graphs a... The attack graph methodology can be used to identify the potential attack paths that an attack can propagate. A risk assessment model based on Bayesian attack graph is presented in this paper. Firstly, attack graphs are generated by the MULVAL(Multi-host, Multistage Vulnerability Analysis) tool according to sufficient information of vulnerabilities, network configurations and host connectivity on networks. Secondly, the probabilistic attack graph is established according to the causal relationships among sophisticated multi-stage attacks by using Bayesian Networks. The probability of successful exploits is calculated by combining index of the Common Vulnerability Scoring System, and the static security risk is assessed by applying local conditional probability distribution tables of the attribute nodes. Finally, the overall security risk in a small network scenario is assessed. Experimental results demonstrate our work can deduce attack intention and potential attack paths effectively, and provide effective guidance on how to choose the optimal security hardening strategy. 展开更多
关键词 risk assessment attack graph Bayesian networks prior probability
原文传递
A network security situation awareness method based on layered attack graph
2
作者 ZHU Yu-hui SONG Li-peng 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2019年第2期182-190,共9页
The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is div... The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is divided into several logical subnets by community discovery algorithm.The logical subnets and connections between them constitute the logical network.Then,based on the original and logical networks,the selection of attack path is optimized according to the monotonic principle of attack behavior.The proposed method can sharply reduce the attack path scale and hence tackle the state explosion problem in NSSA.The experiments results show that the generation of attack paths by this method consumes 0.029 s while the counterparts by other methods are more than 56 s.Meanwhile,this method can give the same security strategy with other methods. 展开更多
关键词 network security situation awareness(NSSA) layered attack graph(LAG) state explosion community detection
在线阅读 下载PDF
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network 被引量:6
3
作者 Shaojun Zhang Shanshan Song 《Journal of Information Security》 2011年第1期8-27,共20页
Network attack graphs are originally used to evaluate what the worst security state is when a concerned net-work is under attack. Combined with intrusion evidence such like IDS alerts, attack graphs can be further use... Network attack graphs are originally used to evaluate what the worst security state is when a concerned net-work is under attack. Combined with intrusion evidence such like IDS alerts, attack graphs can be further used to perform security state posterior inference (i.e. inference based on observation experience). In this area, Bayesian network is an ideal mathematic tool, however it can not be directly applied for the following three reasons: 1) in a network attack graph, there may exist directed cycles which are never permitted in a Bayesian network, 2) there may exist temporal partial ordering relations among intrusion evidence that can-not be easily modeled in a Bayesian network, and 3) just one Bayesian network cannot be used to infer both the current and the future security state of a network. In this work, we improve an approximate Bayesian posterior inference algorithm–the likelihood-weighting algorithm to resolve the above obstacles. We give out all the pseudocodes of the algorithm and use several examples to demonstrate its benefit. Based on this, we further propose a network security assessment and enhancement method along with a small network scenario to exemplify its usage. 展开更多
关键词 NETWORK Security attack graph POSTERIOR INFERENCE Bayesian NETWORK Likelihood-Weighting
在线阅读 下载PDF
Adaptive regulation-based Mutual Information Camouflage Poisoning Attack in Graph Neural Networks
4
作者 Jihui Yin Taorui Yang +3 位作者 Yifei Sun Jianzhi Gao Jiangbo Lu Zhi-Hui Zhan 《Journal of Automation and Intelligence》 2025年第1期21-28,共8页
Studies show that Graph Neural Networks(GNNs)are susceptible to minor perturbations.Therefore,analyzing adversarial attacks on GNNs is crucial in current research.Previous studies used Generative Adversarial Networks ... Studies show that Graph Neural Networks(GNNs)are susceptible to minor perturbations.Therefore,analyzing adversarial attacks on GNNs is crucial in current research.Previous studies used Generative Adversarial Networks to generate a set of fake nodes,injecting them into a clean GNNs to poison the graph structure and evaluate the robustness of GNNs.In the attack process,the computation of new node connections and the attack loss are independent,which affects the attack on the GNN.To improve this,a Fake Node Camouflage Attack based on Mutual Information(FNCAMI)algorithm is proposed.By incorporating Mutual Information(MI)loss,the distribution of nodes injected into the GNNs become more similar to the original nodes,achieving better attack results.Since the loss ratios of GNNs and MI affect performance,we also design an adaptive weighting method.By adjusting the loss weights in real-time through rate changes,larger loss values are obtained,eliminating local optima.The feasibility,effectiveness,and stealthiness of this algorithm are validated on four real datasets.Additionally,we use both global and targeted attacks to test the algorithm’s performance.Comparisons with baseline attack algorithms and ablation experiments demonstrate the efficiency of the FNCAMI algorithm. 展开更多
关键词 Mutual information Adaptive weighting Poisoning attack graph neural networks
在线阅读 下载PDF
Optimal Cyber-attack Evaluation for Cross-domain Cascading Failures Considering Spatiotemporal Synergy of Multiple Attack-event-chains
5
作者 Yihan Liu Yufei Wang +1 位作者 Hongru Wang Qi Wang 《CSEE Journal of Power and Energy Systems》 2026年第1期495-507,共13页
According to the dynamic interaction process between cyber flow and power flow in grid cyber-physical systems(GCPS),attackers could gradually trigger large-scale power failures through cooperative cyber-attacks,subseq... According to the dynamic interaction process between cyber flow and power flow in grid cyber-physical systems(GCPS),attackers could gradually trigger large-scale power failures through cooperative cyber-attacks,subsequently forming cross-domain cascading failures(CDCF)that cross cyber-domain and power-domain and endanger the stable running of GCPS.To reveal the evolutionary mechanism of CDCF,an optimal attack scheme evaluation method is proposed,considering the spatiotemporal synergy of multiple attack-event-chains.First,in accordance with the spatiotemporal synergy of multiple attack-event-chains,the CDCF evolutionary mechanism is analyzed from the attackers'perspective,and a CDCF mathematical model is established.Furthermore,an attack graph model of CDCF evolution and its hazard calculation method are proposed.Then,the attackers'decision-making process for the optimal attack scheme of CDCF is deduced based on the attack graph model.Finally,both the evaluation and implementation processes of the optimal attack scheme are simulated in the GCPS experimental system based on IEEE-39 bus systems. 展开更多
关键词 attack graph cascading failure cyber-attacks grid cyber-physical system optimal attack scheme
原文传递
基于改进GraphSAGE的网络攻击检测
6
作者 闫彦彤 于文涛 +1 位作者 李丽红 方伟 《郑州大学学报(理学版)》 北大核心 2026年第1期27-34,共8页
基于深度学习的网络攻击检测是对欧几里得数据进行建模,无法学习攻击数据中的结构特征。为此,提出一种基于改进图采样与聚合(graph sample and aggregate,GraphSAGE)的网络攻击检测算法。首先,将攻击数据从平面结构转换为图结构数据。其... 基于深度学习的网络攻击检测是对欧几里得数据进行建模,无法学习攻击数据中的结构特征。为此,提出一种基于改进图采样与聚合(graph sample and aggregate,GraphSAGE)的网络攻击检测算法。首先,将攻击数据从平面结构转换为图结构数据。其次,对GraphSAGE算法进行了改进,包括在消息传递阶段融合节点和边的特征,同时在消息聚合过程中考虑不同源节点对目标节点的影响程度,并在边嵌入生成时引入残差学习机制。在两个公开网络攻击数据集上的实验结果表明,在二分类情况下,所提算法的总体性能优于E-GraphSAGE、LSTM、RNN、CNN算法;在多分类情况下,所提算法在大多数攻击类型上的F1值高于对比算法。 展开更多
关键词 网络攻击检测 深度学习 图神经网络 图采样与聚合 注意力机制
在线阅读 下载PDF
A graph based system for multi-stage attacks recognition
7
作者 Safaa O.Al-Mamory 《High Technology Letters》 EI CAS 2008年第2期167-173,共7页
Building attack scenario is one of the most important aspects in network security.This paper pro-posed a system which collects intrusion alerts,clusters them as sub-attacks using alerts abstraction,ag-gregates the sim... Building attack scenario is one of the most important aspects in network security.This paper pro-posed a system which collects intrusion alerts,clusters them as sub-attacks using alerts abstraction,ag-gregates the similar sub-attacks,and then correlates and generates correlation graphs.The scenarios wererepresented by alert classes instead of alerts themselves so as to reduce the required rules and have the a-bility of detecting new variations of attacks.The proposed system is capable of passing some of the missedattacks.To evaluate system effectiveness,it was tested with different datasets which contain multi-stepattacks.Compressed and easily understandable Correlation graphs which reflect attack scenarios were gen-erated.The proposed system can correlate related alerts,uncover the attack strategies,and detect newvariations of attacks. 展开更多
关键词 network security intrusion detection alert correlation attack graph SCENARIO clus-tering
在线阅读 下载PDF
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs
8
作者 Armita Kazeminajafabadi Mahdi Imani 《Cybersecurity》 EI CSCD 2024年第1期1-15,共15页
Early attack detection is essential to ensure the security of complex networks,especially those in critical infrastructures.This is particularly crucial in networks with multi-stage attacks,where multiple nodes are co... Early attack detection is essential to ensure the security of complex networks,especially those in critical infrastructures.This is particularly crucial in networks with multi-stage attacks,where multiple nodes are connected to external sources,through which attacks could enter and quickly spread to other network elements.Bayesian attack graphs(BAGs)are powerful models for security risk assessment and mitigation in complex networks,which provide the probabilistic model of attackers’behavior and attack progression in the network.Most attack detection techniques developed for BAGs rely on the assumption that network compromises will be detected through routine monitoring,which is unrealistic given the ever-growing complexity of threats.This paper derives the optimal minimum mean square error(MMSE)attack detection and monitoring policy for the most general form of BAGs.By exploiting the structure of BAGs and their partial and imperfect monitoring capacity,the proposed detection policy achieves the MMSE optimality possible only for linear-Gaussian state space models using Kalman filtering.An adaptive resource monitoring policy is also introduced for monitoring nodes if the expected predictive error exceeds a user-defined value.Exact and efficient matrix-form computations of the proposed policies are provided,and their high performance is demonstrated in terms of the accuracy of attack detection and the most efficient use of available resources using synthetic Bayesian attack graphs with different topologies. 展开更多
关键词 Multi-stage attacks Bayesian attack graph attack detection Optimal monitoring
原文传递
Multiobjective network security dynamic assessment method based on Bayesian network attack graph
9
作者 Jialiang Xie Shanli Zhang +1 位作者 Honghui Wang Mingzhi Chen 《International Journal of Intelligent Computing and Cybernetics》 2024年第1期38-60,共23页
Purpose:With the rapid development of Internet technology,cybersecurity threats such as security loopholes,data leaks,network fraud,and ransomware have become increasingly prominent,and organized and purposeful cybera... Purpose:With the rapid development of Internet technology,cybersecurity threats such as security loopholes,data leaks,network fraud,and ransomware have become increasingly prominent,and organized and purposeful cyberattacks have increased,posing more challenges to cybersecurity protection.Therefore,reliable network risk assessment methods and effective network security protection schemes are urgently needed.Design/methodology/approach:Based on the dynamic behavior patterns of attackers and defenders,a Bayesian network attack graph is constructed,and a multitarget risk dynamic assessment model is proposed based on network availability,network utilization impact and vulnerability attack possibility.Then,the selforganizing multiobjective evolutionary algorithm based on grey wolf optimization is proposed.And the authors use this algorithm to solve the multiobjective risk assessment model,and a variety of different attack strategies are obtained.Findings:The experimental results demonstrate that the method yields 29 distinct attack strategies,and then attacker’s preferences can be obtained according to these attack strategies.Furthermore,the method efficiently addresses the security assessment problem involving multiple decision variables,thereby providing constructive guidance for the construction of security network,security reinforcement and active defense.Originality/value:A method for network risk assessment methods is given.And this study proposed a multiobjective risk dynamic assessment model based on network availability,network utilization impact and the possibility of vulnerability attacks.The example demonstrates the effectiveness of the method in addressing network security risks. 展开更多
关键词 Bayesian network attack graph Multiobjective risk assessment model GWO-SMEA Network security assessment
在线阅读 下载PDF
卫星网络渗透测试应用研究综述
10
作者 赵博夫 王布宏 《计算机工程与应用》 北大核心 2026年第7期1-20,共20页
随着卫星网络在全球范围的深度部署和多领域应用,其安全防护问题日益成为国际社会关注的焦点。渗透测试是一种主动安全评估技术,利用攻击工具模拟入侵,发现目标网络存在的安全隐患。在概述卫星网络组成基础上,系统分析卫星网络攻击行为... 随着卫星网络在全球范围的深度部署和多领域应用,其安全防护问题日益成为国际社会关注的焦点。渗透测试是一种主动安全评估技术,利用攻击工具模拟入侵,发现目标网络存在的安全隐患。在概述卫星网络组成基础上,系统分析卫星网络攻击行为的特点和规律,重点阐述渗透测试技术在卫星领域的应用情况。依据渗透决策机制,将相关技术划分为基于规则的渗透测试和基于模型的渗透测试两类,并分别详述了这两类技术在卫星网络环境下的具体应用。结合大语言模型技术在渗透测试领域的最新进展,对卫星网络渗透测试技术的未来发展趋势进行展望。 展开更多
关键词 卫星网络 渗透测试 攻击图
在线阅读 下载PDF
基于Takens-Transformer与GCN的DDoS攻击检测
11
作者 邓钰洋 芦天亮 +2 位作者 李知皓 孟昊阳 李锦儒 《计算机应用研究》 北大核心 2026年第2期567-576,共10页
针对现有分布式拒绝服务(DDoS)攻击检测适应性弱、计算成本高的问题,提出基于时间延迟嵌入和图卷积网络的Transformer模型(TDE-TGCN)。该模型利用Takens定理将网络流量建模为动力学系统,通过时间延迟嵌入揭示DDoS攻击对流量非线性特征... 针对现有分布式拒绝服务(DDoS)攻击检测适应性弱、计算成本高的问题,提出基于时间延迟嵌入和图卷积网络的Transformer模型(TDE-TGCN)。该模型利用Takens定理将网络流量建模为动力学系统,通过时间延迟嵌入揭示DDoS攻击对流量非线性特征的影响;采用Transformer模型将流量序列映射至高维空间,通过多头注意力机制捕捉突发性和全局关联;结合图卷积网络挖掘拓扑信息及跨节点攻击模式。在CIC-IDS2017等数据集和特征变异模拟的未知攻击场景下,TDE-TGCN检测准确率达到98.7%,误报率降低至1.2%,计算效率提升35%;消融实验验证了各组件对模型性能的显著贡献。该研究从动力学系统角度重新审视网络流量特征,提出理论与实践相结合的检测框架,为复杂网络环境下的DDoS攻击检测提供了有效技术方案。 展开更多
关键词 网络流量 DDOS攻击检测 Takens定理 图卷积网络 TRANSFORMER
在线阅读 下载PDF
基于动静态语义行为增强的APT攻击溯源研究
12
作者 杨秀璋 彭国军 +4 位作者 王晨阳 周逸林 李家琛 武帅 傅建明 《武汉大学学报(理学版)》 北大核心 2026年第1期57-70,共14页
针对高级可持续威胁(Advanced Persistent Threat,APT)溯源未考虑ATT&CK(Adversarial Tactics,Techniques,and Common Knowledge)技战术和攻击语义行为增强,未融合动静态两个视角探索和实现攻击行为互补的溯源分析,易被加壳和混淆的... 针对高级可持续威胁(Advanced Persistent Threat,APT)溯源未考虑ATT&CK(Adversarial Tactics,Techniques,and Common Knowledge)技战术和攻击语义行为增强,未融合动静态两个视角探索和实现攻击行为互补的溯源分析,易被加壳和混淆的APT恶意软件逃避问题,提出一种基于动静态语义行为增强的APT攻击溯源(Advanced Persistent Threat Eye,APTEye)模型。首先,构建APT组织恶意软件样本集并实施预处理;其次,提取恶意软件的静态行为特征与动态行为特征;再次,设计行为特征语义增强及表征算法,分别利用Attack2Vec将静态API特征和攻击链以及语义行为映射,APISeq2Vec增强动态API序列的时间语义关系,实现低级别行为特征到高级别攻击模式的映射;接着,构建动静态特征对齐和行为语义聚合算法将APT攻击恶意软件的动态静态特征融合;最后,构建图注意力网络模型溯源APT组织。实验结果表明,APTEye模型能有效追踪溯源APT攻击,其精确率、召回率和F1值分别为92.24%、91.85%和92.04%,均优于现有模型。此外,APTEye模型能够有效识别细粒度的动静态API函数及攻击行为,实现与ATT&CK技战术映射,为后续APT攻击的意图推理和攻击阻断提供支撑。 展开更多
关键词 高级可持续威胁 APT攻击溯源 语义行为增强 图注意力网络
原文传递
基于生成对抗的图注入攻击
13
作者 乔晓楠 刘勇 杨雷 《黑龙江大学工程学报(中英俄文)》 2026年第1期43-52,共10页
图神经网络(GNNs)在处理图相关任务时表现出色,已成为图数据分析和机器学习领域的重要工具。但近期研究发现其易受对抗性攻击影响,导致性能下降。现有研究多通过直接修改图结构(如添加或删除边)发起攻击,而这种方式在实际中难以实施。... 图神经网络(GNNs)在处理图相关任务时表现出色,已成为图数据分析和机器学习领域的重要工具。但近期研究发现其易受对抗性攻击影响,导致性能下降。现有研究多通过直接修改图结构(如添加或删除边)发起攻击,而这种方式在实际中难以实施。图注入攻击(GIA)作为一种更现实的攻击方法,允许攻击者仅通过注入少量恶意节点而不修改现有节点或边来实施攻击。多数GIA常因防御和检测方法能够轻易识别并移除注入节点而失败。提出了一种基于生成对抗的节点注入攻击方法(Generative adversarial node injection attack,GANIA)。该方法利用生成对抗网络(GAN)生成注入节点的特征,并提出分层目标选择策略,通过预处理滤波器、度滤波器、边缘滤波器分层选择易受攻击的原始节点。将GAN生成的节点连接至易受攻击的原始节点,精准攻击目标GNN。实验结果表明,与现有的其他攻击方法相比,GANIA在攻击效果方面有显著提高。 展开更多
关键词 图神经网络 图注入攻击 生成对抗网络
在线阅读 下载PDF
攻击图辅助下基于深度强化学习的服务功能链攻击恢复方法
14
作者 周德强 季新生 +2 位作者 游伟 邱航 杨杰 《计算机科学》 北大核心 2026年第1期371-381,共11页
服务功能链(SFC)凭借按需编排、灵活组网等优势为6G六大场景提供定制化服务,6G网络则对服务功能链性能提出更高要求。弹性首次在6G网络中受到关注,要求服务功能链具备确保基本功能持续稳定的能力,其中弹性恢复是关键阶段。现有恢复方法... 服务功能链(SFC)凭借按需编排、灵活组网等优势为6G六大场景提供定制化服务,6G网络则对服务功能链性能提出更高要求。弹性首次在6G网络中受到关注,要求服务功能链具备确保基本功能持续稳定的能力,其中弹性恢复是关键阶段。现有恢复方法往往基于备份机制,导致资源浪费,同时忽略了攻击路径对恢复的影响,导致恢复效果难以保证。因此,充分考虑网络攻击特征,利用服务功能链攻击图确定服务功能链,定制化攻击恢复方案,包括VNF恢复范围及攻击恢复等级需求。为进一步求解符合定制化攻击恢复方案的放置方案,提出了一种基于深度强化学习的服务功能链攻击恢复算法DRL-SFCAR。仿真结果表明,与现有方法相比,DRL-SFCAR在保证恢复成功率的同时,在时延和恢复成本方面表现优异,能够保证攻击恢复效果,同时最小化长期恢复成本,为网络攻击场景下的SFC恢复提供可行方案。 展开更多
关键词 服务功能链 弹性恢复 攻击图 深度强化学习 成本
在线阅读 下载PDF
图神经网络后门攻击与防御综述
15
作者 丁艳 丁红发 +1 位作者 喻沐然 蒋合领 《计算机科学》 北大核心 2026年第3期1-22,共22页
在人工智能技术驱动的智能信息系统中,图神经网络(GNN)因其强大的图结构建模能力,被广泛应用于社交网络分析和金融风控等关键场景的知识发现与决策支持。然而,此类系统高度依赖第三方数据与模型,使GNN面临隐蔽的后门攻击威胁。攻击者通... 在人工智能技术驱动的智能信息系统中,图神经网络(GNN)因其强大的图结构建模能力,被广泛应用于社交网络分析和金融风控等关键场景的知识发现与决策支持。然而,此类系统高度依赖第三方数据与模型,使GNN面临隐蔽的后门攻击威胁。攻击者通过注入后门触发器或篡改模型,可诱导系统对含特定模式的输入产生预设错误输出,进而破坏智能信息服务的可信性与可靠性。为保障智能信息系统的安全可控,从数据和模型两个层面对GNN后门攻击与防御研究进行了系统性综述。首先,深入分析了GNN在数据集收集、模型训练和部署阶段面临的后门攻击风险,构建了清晰的GNN后门攻防模型。其次,依据GNN后门攻击的实施阶段和攻击者能力,将后门攻击分为包含了6种面向数据的攻击和2种面向模型的攻击;依据防御实施阶段和防御者能力,将GNN后门防御方法分为面向数据、面向模型和面向鲁棒训练的防御;对各类方法的核心原理、技术特点进行了详细对比分析,阐释了其优缺点。最后,总结了当前研究面临的主要挑战,并展望了未来研究方向。提出的后门攻防模型和分类体系,有助于深入理解智能信息系统中的GNN后门安全威胁的本质及技术演进,推动下一代可信智能信息系统的安全设计与实践。 展开更多
关键词 图神经网络 后门攻击 后门防御 后门触发器 数据隐私与安全 智能信息系统
在线阅读 下载PDF
基于知识图谱分析的网络安全风险自动化识别系统
16
作者 曲峰 《电子设计工程》 2026年第1期192-196,共5页
在网络安全领域,随着网络攻击的复杂化和频率的增加,传统的安全防御手段已经不能满足对抗新型威胁的需求。因此,研究提出了一种基于知识图谱的网络安全风险自动化识别模型。该模型通过收集国家漏洞数据库等多源数据,构建结构化的知识图... 在网络安全领域,随着网络攻击的复杂化和频率的增加,传统的安全防御手段已经不能满足对抗新型威胁的需求。因此,研究提出了一种基于知识图谱的网络安全风险自动化识别模型。该模型通过收集国家漏洞数据库等多源数据,构建结构化的知识图谱,提取攻击相关的实体、关系及属性,设计基于知识图谱的攻击图模型,并引入贝叶斯网络以捕捉攻击路径中的概率依赖关系,优化攻击路径的预测过程。实验结果表明,当数据集规模达到1 000个时,贝叶斯网络模型的准确率达到0.98,显著高于马尔可夫网络的0.82和因子图模型的0.78;贝叶斯网络模型、马尔可夫网络模型、因子图模型的误报率分别为0.21、0.29和0.34。贝叶斯网络在不同攻击类型的检测中均表现出较高的准确率和较低的误报率,对DDoS检测准确率为0.976,误报率为0.155。研究结果表明,贝叶斯网络模型在准确率和误报率上均表现出色,特别是在处理大规模数据和复杂网络环境中具有较高的效率和精确度,能够为网络安全领域的进一步研究和实践提供理论支持和技术指导。 展开更多
关键词 知识图谱 网络安全 风险 贝叶斯网络 攻击图
在线阅读 下载PDF
基于服务器主动安全的自动化红队测试技术研究
17
作者 周勇 陈玺名 +4 位作者 程度 仇晶 袁启 张献 李晓辉 《微电子学与计算机》 2026年第2期126-138,共13页
高级持续性威胁(Advanced Persistent Threat, APT)对政府机构、企业及其他组织的网络安全和隐私构成了严重威胁。在现有的红队测试中,缺乏明确的攻击行为顺序指导,导致潜在网络威胁的推理和验证效率低下。为解决这一问题,提出了一种基... 高级持续性威胁(Advanced Persistent Threat, APT)对政府机构、企业及其他组织的网络安全和隐私构成了严重威胁。在现有的红队测试中,缺乏明确的攻击行为顺序指导,导致潜在网络威胁的推理和验证效率低下。为解决这一问题,提出了一种基于偏序规划的攻击图构建方法。这种方法能够快速、准确且有序地预测潜在的威胁路径。此外,现有的威胁评估指标主要集中于通用威胁评估,忽视了实际网络环境中威胁利用的难度。针对这一问题,提出了一种结合CVSS和代理深度的风险评估模型,以更全面地衡量风险。设计了一款基于攻击图的自动化渗透测试工具,能够实现基于攻击路径的自主信息收集、渗透测试和后渗透测试的全流程自动化。通过在多个网络环境中的验证,结果表明:所提方法能够有效推理攻击序列并针对攻击路径可行性实现高效精准评估,最终指导自动化渗透攻击实现可行性验证。 展开更多
关键词 攻击图 风险评估 自动化渗透 网络攻防
在线阅读 下载PDF
基于wk-GDNN模型的虚假数据注入攻击检测研究
18
作者 曾洋 李秀芹 《电力信息与通信技术》 2026年第1期72-78,共7页
虚假数据注入攻击(false data injection attack,FDIA)对电网系统安全具有重要影响,当下深度学习在面对电网拓扑结构信息数据处理及长期依赖关系捕捉方面仍有不足。为进一步提高当前智能电网虚假数据注入攻击检测模型的准确性和鲁棒性,... 虚假数据注入攻击(false data injection attack,FDIA)对电网系统安全具有重要影响,当下深度学习在面对电网拓扑结构信息数据处理及长期依赖关系捕捉方面仍有不足。为进一步提高当前智能电网虚假数据注入攻击检测模型的准确性和鲁棒性,文章引用了Wiener-Khinchin(wk)定理对数据做频域信息处理,并创新性地提出了基于Decoder优化的图频域卷积神经网络(Wiene-Khinchin guided dual-domain neural network,wk-GDNN)检测模型。wk-GDNN模型将隐藏在数据中的时间特征信息转化为频域信息,结合了图卷积网络(graph convolutional networks,GCN)的电网拓扑感知能力,并通过Decoder的上下文信息提取能力优化时空特征提取,提升了检测精度并基于IEEE-14/118节点系统仿真验证有效性。实验结果显示,该模型的F1分数分别为0.9798和0.9761,相较于对比模型F1分数平均有6.67%的提升。结果表明,基于wk定理的频域预处理与后续的频域图卷积协同解码,为FDIA检测提供了一种从时域到频域、从节点到系统的多尺度联合建模新范式。 展开更多
关键词 智能电网 虚假数据注入攻击 图卷积网络(GCN) 时空特征 频谱卷积
在线阅读 下载PDF
基于图神经网络的油田生产网络攻击路径挖掘方法
19
作者 黄芳宁 宋养齐 +2 位作者 兰鹏博 芦鹏 秦海峰 《无线互联科技》 2026年第3期107-111,共5页
面向油田生产网络在多制式无线互联条件下攻击面扩展、威胁链条跨域穿透与攻击路径难以快速定位的问题,文章提出了一种基于图神经网络的攻击路径挖掘方法,构建异构攻击图,采用图神经网络(Graph Neural Network,GNN)进行表征学习,将风险... 面向油田生产网络在多制式无线互联条件下攻击面扩展、威胁链条跨域穿透与攻击路径难以快速定位的问题,文章提出了一种基于图神经网络的攻击路径挖掘方法,构建异构攻击图,采用图神经网络(Graph Neural Network,GNN)进行表征学习,将风险图映射为代价函数,生成关键资产Top-K高风险攻击路径,输出关键节点/边解释集合。实验结果表明,该方法在多个指标上优于通用漏洞评分系统(Common Vulnerability Scoring System,CVSS)累乘、中心性排序与传统机器学习基线,具备油田安全监测与联动防护的工程适用性。 展开更多
关键词 图神经网络 异构攻击图 攻击路径挖掘 油田生产网络
在线阅读 下载PDF
融合溯源图与知识图谱的APT攻击检测模型研究
20
作者 安渊 鲍永庆 《网络安全与数据治理》 2026年第3期10-16,共7页
针对高级持续性威胁(APT)攻击所具有的隐蔽性强、持续时间长、多阶段渐进的特点,提出了一种融合动态系统行为溯源图与静态威胁情报知识图谱的检测模型。该模型使用时空图注意力网络联合建模攻击链中的空间依赖与时间演化关系。通过图注... 针对高级持续性威胁(APT)攻击所具有的隐蔽性强、持续时间长、多阶段渐进的特点,提出了一种融合动态系统行为溯源图与静态威胁情报知识图谱的检测模型。该模型使用时空图注意力网络联合建模攻击链中的空间依赖与时间演化关系。通过图注意力网络捕捉实体间可疑关联,通过门控循环单元建模行为序列的阶段性演进,从而实现对APT攻击全链条的端到端检测。在Windows-APTs Dataset 2025公开数据集上的实验表明,所提模型在APT多分类检测任务中性能良好,准确率达95.14%,F1分数为95.29%。 展开更多
关键词 APT攻击检测 溯源图 知识图谱
在线阅读 下载PDF
上一页 1 2 24 下一页 到第
使用帮助 返回顶部