检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]浙江省公安厅网警总队,杭州311400 [2]北京科技大学信息工程学院,北京100083
出 处:《计算机应用》2009年第B06期74-76,共3页journal of Computer Applications
基 金:国家自然科学基金资助项目(60572162)
摘 要:为解决复杂系统安全威胁评估问题,研究并建立了基于攻击路径图的系统安全威胁模型。该模型首先提出了漏洞利用可能性及利用结果的评估标准,进而在分析漏洞之间利用关系的基础上生成目标系统的攻击路径图,并以图论、概率论等理论作为基本方法对将复杂攻击路径分解为以串、并联形式为基本构成单元的简单路径,从而降低了安全威胁评估问题的规模和难度,实现了对漏洞威胁以及攻击路径威胁的量化评估。In order to solve the problem of evaluation of system security threat in the complex information system, a system security threat model based on the attack-path graph was proposed. The model gives an evaluating standard of the possibility and harmful level of the vulnerability exploitation. Then an attack-path graph of the target system can be generated based on the exploitation relationship among vulnerabilities. Based on methods in the graph theory and probability theory, we can decompose the complicated attack-paths into several simple paths whose basal unit is series or parallel form. So, the dimensions and difficulty of evaluation of security threat is lowered greatly, and the quantitative evaluation to the threat of vulnerability and attack-path can be well done.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.63