马俊春, 孙继银, 王勇军, 李琳琳. 一种高效的攻击图生成方法研究[J]. 微电子学与计算机, 2011, 28(4): 13-17.
引用本文: 马俊春, 孙继银, 王勇军, 李琳琳. 一种高效的攻击图生成方法研究[J]. 微电子学与计算机, 2011, 28(4): 13-17.
MA Jun-chun, SUN Ji-yin, WANG Yong-jun, LI Lin-lin. An Effective Method of Generating Attack Graphs[J]. Microelectronics & Computer, 2011, 28(4): 13-17.
Citation: MA Jun-chun, SUN Ji-yin, WANG Yong-jun, LI Lin-lin. An Effective Method of Generating Attack Graphs[J]. Microelectronics & Computer, 2011, 28(4): 13-17.

一种高效的攻击图生成方法研究

An Effective Method of Generating Attack Graphs

  • 摘要: 提出了一种适用于大规模复杂网络系统的攻击图生成算法, 从主机间可达性、安全防护系统、主机系统和网络服务四个层面对目标网络进行建模, 提出了主机间可达性参数的自动获取技术, 从而有效支持了大规模目标网络建模的自动化, 通过实验分析证明, 本算法能够适合全面分析网络安全性和攻击者可能采取的行为方式.

     

    Abstract: This paper proposes a kind of attack graph generation algorithm for large-scale complex network system.Model the target network in four levels: hosts′ accessibility, security systems, host systems and network services, and propose an automatic gain technology for hosts′ accessibility parameters.This algorithm supports effectively the modeling automatically of large-scale target network.From the experiment results we can see, this algorithm can satisfy analyzing network security and the action of attacker roundly.

     

/

返回文章
返回