检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
出 处:《计算机工程与应用》2011年第5期87-91,133,共6页Computer Engineering and Applications
基 金:陕西省自然科学基金(No.2007E217);陕西省教育厅专项基金资助项目(No.09JK524)
摘 要:以具有时间特性的模糊时间Petri网为研究方法建立了一种新的网络攻击模型。在模型中主要引入双枝模糊集理论和可靠性理论。利用双枝模糊集中的上域(下域)表示攻击的促进因素(阻碍因素),并在此基础上进行双枝模糊决策以决定变迁(攻击行为)激发对其后集中库所(攻击状态)的影响效果。该模型认为攻击过程是一个可修复的复杂系统,库所代表的攻击状态在随机失效后,便进入一个具有模糊时间区间的修复期,并在修复期后恢复攻击状态,这样做更符合攻击者总是维持攻击状态,使其利于攻击的事实。最后,对这种模型的攻击路径和系统的可靠性进行了分析,并以例子对模型进行了仿真验证。Based on the fuzzy timed Petri net,which has time characteristics,a new network attack model is set up.In the model,mainly the both-branch fuzzy sets and reliability theory are introduced.This model uses the superior domain(or inferior domain) of the both-branch fuzzy sets to represent promoting factors(or hindering factors) of an attack respectively,carries on the both-branch fuzzy sets-based decisions to decide influencing effects on the places in a transition’s post-set after the transition(an attack behavior) is fired.In the model,an attacking process is abstracted as a complicated system that can be repaired.After random failure,attack states represented by places will enter into a repairable phase which has a fuzzy time interval,and resume to attacking states after the repairable phase.In this way,the model can conform more truly to the fact that an attacker always keeps an attack state to be favorable to his attack.Finally the attack route generating algorithm of the model and the reliability analysis of system are made,and a simulation example is made to show that the model has good performances.
关 键 词:网络攻击模型 模糊时间PETRI网 双枝模糊决策 可靠性
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.26