检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]甘肃农业大学信息科学技术学院,兰州730070
出 处:《计算机科学》2013年第9期156-158,193,共4页Computer Science
基 金:国家自然科学基金2011(61063028)资助
摘 要:针对当前攻击图在大范围网络应用中具有时间复杂度以及图形化描述不准确等缺陷,提出了一种基于智能化状态转移以及权限改进的攻击图构建方法:采用智能化状态转移途径构建攻击模型,依据该模型规划相应的攻击图,并在攻击图生成中引入了权限改进体制,该方法以主机间的连接分析为依据,根据网络攻击状态图中不同主机的原始权限,获取攻击权限的改进路径,能够针对网络变换情况调整主机的权限,进而确保相应网络的安全性,针对大规模复杂化网络攻击问题构建有效的攻击图,以确保整体网络的安全性和高效性。通过最终的仿真实验可得,该方法构建网络攻击图的时间较短,具备较低的时间复杂度和较高的扩展性,是一种高效的攻击图构建方法。In view of the current attack graph in a wide range of network applications with time complexity and not ac-curate graphical description, this paper put forward a attack graph construction method based on intelligent state transi-tion as well as permission improvement, which adopts the intelligent state transition way to build attack model, based on the model of planning the corresponding attack graph generation algorithm, and introduces the permissions in the attack graph generation algorithm improvement system. The method based on host connections between analysis, based on net- work attack state graph and network of different host original permissions, access permissions attack improvement path,can adjust the host network transformation condition in the permissions, then ensure network security, corre-sponding to large-scale complicated network attacks effectively attack graph, to ensure the overall network security and high-efficiency. By the final simulation experiment, this method can decrease consumption of system CPU time to com-plete the construction of network attack graph,has lower time complexity and high scalability, is a highly efficient attack graph method.
分 类 号:TP311[自动化与计算机技术—计算机软件与理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.31