检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:郭春霞[1] 刘增良[2] 张智南[1] 陶源[1]
机构地区:[1]北京科技大学信息工程学院,北京100083 [2]国防大学信息作战研究所,北京100091
出 处:《电讯技术》2009年第10期11-14,共4页Telecommunication Engineering
基 金:国家自然科学基金重大研究计划(90818025);国家自然科学基金资助项目(60572162)
摘 要:以因素空间(FS)理论为基础,将网络攻击条件、手段与其攻击目标相结合,定义了一种基于因素空间的网络攻击知识模型(FSAKM)。对攻击中的各种因素综合考虑和分析,包括与目标实现相关的攻击条件认知、攻击功能支撑关系、系统状态和人员能力级别,以及攻击因素间关系和衡量标准。采用因素模糊空间搜索算法获取攻击条件和功能集映射的测度,将其与获自于攻击单元和目标集的映射结果比较,根据人员操作能力提取与之相称的对应手段,通过实验验证了模型与算法效果。研究结果为安全人员的训练和能力验证提供了技术手段。Combined with attack factors, skill and attack aim, a network attacks knowledge model based on factor space theory(FSAKM) is prompted. A variety of factors of attack is considered and analysed, including the realization of the objectives related to cognitive point of view, the function of the attack, the state system, stafflevel capacity, as well as attacks on the relationship between factors and criteria. Factor fuzzy space search algorithm is used to obtain measurement from mapping set of attack condition and fea- ture set. Then the measurement is compared with the mapping result of attack units and the goal set. Ac- cording to the staff ability, some operation commensurate with the attack planning and the corresponding means are extracted. Finally an experimental verification of the model and algorithm is given. The research conclusion can provide a technical means for security personnel training and ability verification.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.63