As information technology security issues become more prominent, the network system security analysis is becoming increasingly important. The paper presents NEG-NSAM, a network security analysis method. Based on network parameters abstract and vulnerability correlation analysis, the network exploitation graph model was constructed, and the dynamic process of a gradual infiltration of the main threats to security objectives was characterized. For large-scale network environment, the simplified algorithm of network exploitation graph model was proposed. Finally, the NEG-NSAM was used to exemplify the network and verify the feasibility and effectiveness of the method.
参考文献
相似文献
引证文献
引用本文
张维明,毛捍东,陈锋.一种基于图论的网络安全分析方法研究[J].国防科技大学学报,2008,30(2):97-101. ZHANG Weiming, MAO Handong, CHEN Feng. Study on Network Security Analysis Method Based on Graph[J]. Journal of National University of Defense Technology,2008,30(2):97-101.