基于智能化状态转移以及权限改进的攻击图构建方法  被引量:1

Attack Graph Construction Method Based on Intelligent State Transition and Permission Improvement

在线阅读下载全文

作  者:马彦图[1] 王联国[1] 

机构地区:[1]甘肃农业大学信息科学技术学院,兰州730070

出  处:《计算机科学》2013年第9期156-158,193,共4页Computer Science

基  金:国家自然科学基金2011(61063028)资助

摘  要:针对当前攻击图在大范围网络应用中具有时间复杂度以及图形化描述不准确等缺陷,提出了一种基于智能化状态转移以及权限改进的攻击图构建方法:采用智能化状态转移途径构建攻击模型,依据该模型规划相应的攻击图,并在攻击图生成中引入了权限改进体制,该方法以主机间的连接分析为依据,根据网络攻击状态图中不同主机的原始权限,获取攻击权限的改进路径,能够针对网络变换情况调整主机的权限,进而确保相应网络的安全性,针对大规模复杂化网络攻击问题构建有效的攻击图,以确保整体网络的安全性和高效性。通过最终的仿真实验可得,该方法构建网络攻击图的时间较短,具备较低的时间复杂度和较高的扩展性,是一种高效的攻击图构建方法。In view of the current attack graph in a wide range of network applications with time complexity and not ac-curate graphical description, this paper put forward a attack graph construction method based on intelligent state transi-tion as well as permission improvement, which adopts the intelligent state transition way to build attack model, based on the model of planning the corresponding attack graph generation algorithm, and introduces the permissions in the attack graph generation algorithm improvement system. The method based on host connections between analysis, based on net- work attack state graph and network of different host original permissions, access permissions attack improvement path,can adjust the host network transformation condition in the permissions, then ensure network security, corre-sponding to large-scale complicated network attacks effectively attack graph, to ensure the overall network security and high-efficiency. By the final simulation experiment, this method can decrease consumption of system CPU time to com-plete the construction of network attack graph,has lower time complexity and high scalability, is a highly efficient attack graph method.

关 键 词:攻击图 网络安全 智能化状态转移 权限改进 

分 类 号:TP311[自动化与计算机技术—计算机软件与理论]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象