检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]清华大学计算机科学与技术系,北京100084
出 处:《系统仿真学报》2008年第S2期136-139,共4页Journal of System Simulation
基 金:国家自然科学基金(90718040;60673187;60803123);中国博士后基金(20080430040)
摘 要:分析网络应用中基于口令的身份认证流程,指出其存在的漏洞,详细分析在帐户锁定策略下远程口令破解的过程,分析帐户锁定对口令破解的影响。使用随机Petri网建立基于系统状态变化的过程模型,利用位置中token数和弧权来模拟帐户锁定阀值和触发锁定,利用循环来模拟多次攻击和防御过程,定义3个主要参数和1个评价指标,量化分析参数和指标的关系,评价不同防御策略下攻击和防御的性能,帮助用户改善防御措施,提高网络安全性。The paper analyzes the flow of identity authentication based password in the network application and indicates the existent leak in the flow.It analyzes particularly the process of remote password crack with the account lock policy and analyzes the account lock's effect on password crack.It founds the process model based on the system state change with the Stochastic Petri Nets.It simulates the account lock valve and touch lock off with the token's number in the place and the arc's power.It simulates many times attack and defense process with the circle.It defines three parameters and one evaluation measure.It quantitatively analyzes the relation between parameters and measure.It evaluates the performance of attack and defense under the different defence policies.It helps users to improve the defence steps and enhance the network security.
关 键 词:网络安全 远程口令破解 帐户锁定 随机PETRI网
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.3