检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:王国玉[1] 王会梅[1] 陈志杰[1] 鲜明[1]
机构地区:[1]国防科技大学电子科学与工程学院,湖南长沙410073
出 处:《国防科技大学学报》2009年第4期74-80,共7页Journal of National University of Defense Technology
摘 要:随着计算机网络入侵技术的不断发展,网络攻击行为表现出不确定性、复杂性和多样性等特点,攻击向大规模、协同化和多层次方向发展,计算机网络攻击建模已成为当前研究的热点。综合论述计算机网络攻击建模的研究概况,剖析网络攻击图的定义,讨论现有的典型网络攻击图的主要生成方法并对其进行复杂性分析,在此基础上归纳总结目前网络攻击图的应用。给出网络攻击图研究的若干热点问题与展望。With the development of the intrusion technology and the uncertainty, complexity and diversity character of the network attack, the next direction will be characterized as large scale, collaboration and multilayered. As a result, modeling of network attack has been the focus of attention. In the current study, firstly, the research background of modeling of network attack and the concept of attack graph are presented. Then the represented network attack graph generating method and its algorithmic complexity are discussed. Finally, the application of network attack graph is given. In conclusion, some major problems and research trends in this area are addressed.
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.3