检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:刘文彦 霍树民 陈扬 仝青 LIU Wenyan;HUO Shumin;CHEN Yang;TONG Qing(National Digital Switching Engineering Technological Research Center, Zhengzhou 450002, China)
机构地区:[1]国家数字交换系统工程技术研究中心,河南郑州450002
出 处:《通信学报》2018年第A02期88-94,共7页Journal on Communications
基 金:国家自然科学基金资助项目(No.61602509);国家自然科学基金创新群体资助项目(No.61521003);国家重点研究发展计划资助项目(No.2016YFB0800100;No.2016YFB0800101)~~
摘 要:网络攻击对网络和信息系统的危害非常大,有必要对网络攻击的过程进行研究和分析,网络攻击链模型是描述攻击的一个好的模型。网络攻击链模型描述了攻击过程,有助于进行威胁情报分析、攻击的事后分析等,其将复杂的攻击分解为相互非独有的阶段或层。通过调研大量攻击链相关学术论文,总结分析了不同的攻击链模型。同时,对攻击链模型下攻击成功概率进行了简单分析,并重点综述了基于攻击链模型的不同防御方法和手段。Network attack is very harmful to network and information system.It is necessary to study the process of network attack and analyze it.Network attack chain model is a good model to describe the attack.The attack process was described,which is helpful for threat intelligence analysis,attack post-analysis,etc.It decomposed complex attacks into stages or layers which were not unique to each other.The different attack chain models was summarized and analyzed by investigating a large number of related academic papers.At the same time,the attack success probability under the attack chain model was analyzed,and the different defense methods and means based on the attack chain model were summarized emphatically.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.3