引用本文: | 王国玉,王会梅,陈志杰,等.基于攻击图的计算机网络攻击建模方法.[J].国防科技大学学报,2009,31(4):74-80.[点击复制] |
WANG Guoyu,WANG Huimei,CHEN Zhijie,et al.Research on Computer Network Attack Modeling Based on Attack Graph[J].Journal of National University of Defense Technology,2009,31(4):74-80[点击复制] |
|
|
|
本文已被:浏览 7034次 下载 6513次 |
基于攻击图的计算机网络攻击建模方法 |
王国玉, 王会梅, 陈志杰, 鲜明 |
(国防科技大学 电子科学与工程学院,湖南 长沙 410073)
|
摘要: |
随着计算机网络入侵技术的不断发展,网络攻击行为表现出不确定性、复杂性和多样性等特点,攻击向大规模、协同化和多层次方向发展,计算机网络攻击建模已成为当前研究的热点。综合论述计算机网络攻击建模的研究概况,剖析网络攻击图的定义,讨论现有的典型网络攻击图的主要生成方法并对其进行复杂性分析,在此基础上归纳总结目前网络攻击图的应用。给出网络攻击图研究的若干热点问题与展望。 |
关键词: 网络攻击 攻击图 攻击建模 |
DOI: |
投稿日期:2009-01-04 |
基金项目: |
|
Research on Computer Network Attack Modeling Based on Attack Graph |
WANG Guoyu, WANG Huimei, CHEN Zhijie, XIAN Ming |
(College of Electronic Science and Engineering, National Univ. of Defense Technology, Changsha 410073, China)
|
Abstract: |
With the development of the intrusion technology and the uncertainty, complexity and diversity character of the network attack, the next direction will be characterized as large scale, collaboration and multilayered. As a result, modeling of network attack has been the focus of attention. In the current study, firstly, the research background of modeling of network attack and the concept of attack graph are presented. Then the represented network attack graph generating method and its algorithmic complexity are discussed. Finally, the application of network attack graph is given. In conclusion, some major problems and research trends in this area are addressed. |
Keywords: network attack attack graph attack modeling |
|
|
|
|
|