首页 | 本学科首页   官方微博 | 高级检索  
   检索      

基于攻击图的计算机网络攻击建模方法
引用本文:王国玉,王会梅,陈志杰,鲜明.基于攻击图的计算机网络攻击建模方法[J].国防科技大学学报,2009,31(4):74-80.
作者姓名:王国玉  王会梅  陈志杰  鲜明
作者单位:国防科技大学,电子科学与工程学院,湖南,长沙,410073
摘    要:随着计算机网络入侵技术的不断发展,网络攻击行为表现出不确定性、复杂性和多样性等特点,攻击向大规模、协同化和多层次方向发展,计算机网络攻击建模已成为当前研究的热点.综合论述计算机网络攻击建模的研究概况,剖析网络攻击图的定义,讨论现有的典型网络攻击图的主要生成方法并对其进行复杂性分析,在此基础上归纳总结目前网络攻击图的应用.给出网络攻击图研究的若干热点问题与展望.

关 键 词:网络攻击  攻击图  攻击建模
收稿时间:1/4/2009 12:00:00 AM

Research on Computer Network Attack Modeling Based on Attack Graph
WANG Guoyu,WANG Huimei,CHEN Zhijie and XIAN Ming.Research on Computer Network Attack Modeling Based on Attack Graph[J].Journal of National University of Defense Technology,2009,31(4):74-80.
Authors:WANG Guoyu  WANG Huimei  CHEN Zhijie and XIAN Ming
Institution:College of Electronic Science and Engineering, National Univ. of Defense Technology, Changsha 410073, China;College of Electronic Science and Engineering, National Univ. of Defense Technology, Changsha 410073, China;College of Electronic Science and Engineering, National Univ. of Defense Technology, Changsha 410073, China;College of Electronic Science and Engineering, National Univ. of Defense Technology, Changsha 410073, China
Abstract:With the development of the intrusion technology and the uncertainty, complexity and diversity character of the network attack, the next direction will be characterized as large scale, collaboration and multilayered. As a result, modeling of network attack has been the focus of attention. In the current study, firstly, the research background of modeling of network attack and the concept of attack graph are presented. Then the represented network attack graph generating method and its algorithmic complexity are discussed. Finally, the application of network attack graph is given. In conclusion, some major problems and research trends in this area are addressed.
Keywords:
本文献已被 万方数据 等数据库收录!
点击此处可从《国防科技大学学报》浏览原始摘要信息
点击此处可从《国防科技大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号