期刊文献+

基于路径收益计算的网络攻击路径行为分析方法 被引量:4

Path Behavior Analysis Method of Network Attack Based on Path Revenue Calculation
下载PDF
导出
摘要 提出一种基于攻击可行性分析的攻击路径生成方法,解决了攻击图中攻击路径存在路径冗余而导致的节点置信度计算不准确问题.通过对基于Bayes推理的似然加权算法进一步改进,能更准确地计算节点的置信度.实验结果表明,改进后的算法有效消除了攻击图中的冗余路径,从而提高了节点置信度的准确性,实现了对攻击路径的有效预测分析. We proposed an attack path generation method based on attack feasibility analysis to solve the problem of attack path existing redundancy caused inaccurate calculation of nodes confidence in attack graph. By further improving likelihood weighting algorithm based on Bayesian inference, the algorithm could calculate the nodes confidence more accurately. Experimental results show that the improved algorithm effectively eliminates the redundant paths in the attack graph, thereby improving the accuracy of nodes confidence, and realizing the effective predictive analysis of the attack path.
作者 王辉 王哲 刘淑芬 WANG Hui WANG Zhe LIU Shufen(College of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454000, Henan Province, China College of Computer Science and Technology, Jilin University, Changchun 130012, China)
出处 《吉林大学学报(理学版)》 CAS CSCD 北大核心 2017年第2期311-321,共11页 Journal of Jilin University:Science Edition
基金 国家自然科学基金(批准号:61472160) 国家科技支撑计划项目(批准号:2014BAH29F03)
关键词 信息安全技术 路径的有效预测 路径收益计算 攻击可行性 information security technology effective prediction of path path revenue calculation feasibility of attack
  • 相关文献

参考文献4

二级参考文献54

  • 1聂雄丁,韩德志,毕坤.云计算数据安全[J].吉林大学学报(工学版),2012,42(S1):332-336. 被引量:7
  • 2王大虎,杨维,魏学业.WEP的安全技术分析及对策[J].中国安全科学学报,2004,14(8):97-100. 被引量:10
  • 3Criado R, Gareia del Amo A. New results on computable effi- ciency and it's stability for complex networks[J]. Journal of Computational and Applied Mathematics, 2006,192 (1) : 59-74. 被引量:1
  • 4Wasserman S, Faust K. Social network analysis: methods and applications [D]. Cambridge University Press, 1994. 被引量:1
  • 5Vazquez A, Pastor-Satorras R, Vespignani A. Large-scale topo- logical and dynamical properties of the internet[J]. Phys. Rev. E, 2002,65 (6) : 066130. 被引量:1
  • 6Adamic L A, Huberman B A. Power-law distribution of the world wide web [J]. Science, 2000,287 (5461) : 2115. 被引量:1
  • 7Sporns O. Network analysis, complexity, and brain function[J]. Complexity, 2002,8 ( 1 ) : 56-60. 被引量:1
  • 8Lew I, Sexton, Thomas R. Network DEA: Efficieney analysis of organizations with complex internal structure[J]. Computersand Operations Research, 2004,31(9) : 1365-1380. 被引量:1
  • 9Xia Yong-xiang. Attack Vulnerability of Complex Communica- tion Networks[J]. IEEE Circuits and Systems, 2008, 55 (1) : 65- 69. 被引量:1
  • 10Schneider C M. The Robustness of Complex Networks[D]. 2011. 被引量:1

共引文献97

同被引文献29

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部