期刊文献+

基于攻击图的计算机网络攻击建模方法 被引量:22

Research on Computer Network Attack Modeling Based on Attack Graph
下载PDF
导出
摘要 随着计算机网络入侵技术的不断发展,网络攻击行为表现出不确定性、复杂性和多样性等特点,攻击向大规模、协同化和多层次方向发展,计算机网络攻击建模已成为当前研究的热点。综合论述计算机网络攻击建模的研究概况,剖析网络攻击图的定义,讨论现有的典型网络攻击图的主要生成方法并对其进行复杂性分析,在此基础上归纳总结目前网络攻击图的应用。给出网络攻击图研究的若干热点问题与展望。 With the development of the intrusion technology and the uncertainty, complexity and diversity character of the network attack, the next direction will be characterized as large scale, collaboration and multilayered. As a result, modeling of network attack has been the focus of attention. In the current study, firstly, the research background of modeling of network attack and the concept of attack graph are presented. Then the represented network attack graph generating method and its algorithmic complexity are discussed. Finally, the application of network attack graph is given. In conclusion, some major problems and research trends in this area are addressed.
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2009年第4期74-80,共7页 Journal of National University of Defense Technology
关键词 网络攻击 攻击图 攻击建模 network attack attack graph attack modeling
  • 相关文献

参考文献33

  • 1Cunningham W H. Optimal Attack and Reinforcement of a Network [J] .Journal of the ACM (JACM), 1985, 32(3): 549- 561. 被引量:1
  • 2Kuang R B. Rule Based Security Checking[R]. Technical Report, MIT lab for Computer Science, 1994. 被引量:1
  • 3Swiler L P, Phillips C, Gaylor T.A Graph Based Network Vulnerability Analysis System, SAND97- 3010/1[R]. Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, 1998. 被引量:1
  • 4Ritchey R W, AmmannP. Using Model Checking to Analyze Network Vulnerabilities[ C]//Proceedings of the IEEE Computer Society Syraposium on Security and Privacy(S&P 2000), Oakland, California, 2000:156 - 165. 被引量:1
  • 5Jha S, Sheyner O, Wing J. Two Formal Analyses of Attack Graphs[ C]//Proceedings of the 15^th IEEE Computer Security Foundations Workshop (CSFW'15), Cape Breton, Nova Scotia, Canada, 2002: 49-63,. 被引量:1
  • 6Sheyner O, Haines J, Jha S, et al. Automated Generation and Analysis of Attack Graphs[ C]//Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P 2002), Oakland, California, 2002: 254- 265. 被引量:1
  • 7Ammann P, Wijesekem D, Kaushik S. Scalable, Graph-based Network Vulnerability Analysis[C]//Proceedings of the 9^th ACM Conference on Computer and Communications Security (CCS'02), Washington DC, ACM, 2002: 217-224. 被引量:1
  • 8Zhang T, Hu M Z, Li D, et al. An Effective Method to Generate Attack Graph [J]. Machine Learning and Cybernetics, 2005:3926- 3931. 被引量:1
  • 9Danforth M. Models for Threat Assessment in Networks [ D]. University of Califomia-davis, 2006. 被引量:1
  • 10Ingols K, Lippmann R, Keith P. Practical Attack Graph Generation for Network Defense [C]//Computer Security-ity Applications Conference, ACSAC apos, 06.22nd Annual Volume, Issue, Dec. 2006:121 - 130. 被引量:1

二级参考文献9

  • 1汪立东.[D].哈尔滨工业大学,2002. 被引量:4
  • 2ASLAM T, KRSUL I, SPAFFORD E H. Use of a taxonomy of security faults[A]. The 19th National Information System Security Conference [C]. Baltimore, Maryland, 1996. 22-25. 被引量:1
  • 3KRSUL I V. Software Vulnerability Analysis[D]. Purdue University, West Lafayette, USA, 1998. 被引量:1
  • 4BISHOP M, BAILEY D. A Critical Analysis of Vulnerability Taxonomies[R]. Technical Report CSE-96-11, Department of Computer Science, University of California, Davis, 1996. 被引量:1
  • 5KNIGHT E, HARTLEY B V. Is your network inviting an attack[J]. Internet Security Advisor, 2000(5/6): 2-5. 被引量:1
  • 6JIWNANI K, ZELKOWITZ M. Maintaining software with a security perspective[A]. ICSM'02[C]. Montréal, 2002. 194-203. 被引量:1
  • 7GLASS R L, VESSEY I. Contemporary application-domain taxonomies[J]. IEEE Software, 1995, 12 (4): 63-76. 被引量:1
  • 8LONGSTAFF T. Update: CERT/CC vulnerability knowledgebase[A]. Technical Presentation at a DARPA Workshop[C]. Savannah, Georgia, 1997. 被引量:1
  • 9单国栋,戴英侠,王航.计算机漏洞分类研究[J].计算机工程,2002,28(10):3-6. 被引量:58

共引文献36

同被引文献221

引证文献22

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部