检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:杨艳丽 宋礼鹏[1] YANG Yanli;SONG Lipeng(School of Big Data,North University of China,Taiyuan 030051,China)
出 处:《计算机工程》2021年第5期104-116,共13页Computer Engineering
基 金:国家自然科学基金(61772478)。
摘 要:针对现有攻击图生成和分析方法多数未考虑社交网络威胁的问题,提出一种基于知识图谱融合社交网络威胁的攻击图生成方法。根据攻击图的构建需求和收集的内网环境数据,设计融合社交网络威胁的网络安全本体模型和知识图谱,以实现对社交网络和物理网络数据的关联分析以及对攻击图输入信息的扩展,基于知识图谱采用广度优先搜索算法生成融合社交网络威胁的攻击图,并给出内部社交网络威胁的攻击成功率计算方法。基于真实网络拓扑和脆弱性信息的实验结果表明,与现有攻击图的相关方法相比,该方法可有效发现网络中潜在的借助社交网络入侵的攻击路径。The existing methods for attack graph generation and analysis do not consider the threats of social network.This paper proposes a method to generate an attack graph integrating social network threats based on a knowledge graph.According to attack graph construction requirements and the collected intranet data,a network security ontology model and knowledge graph that integrate social network threats are designed.The model and the knowledge graph enable the analysis of the association between social network data and physical network data,as well as the extension of the input information of the attack graph.Then based on the knowledge graph,a breadth-first search algorithm is used to generate an attack graph that integrates social network threats,and a method for calculating the attack success rate of internal social network threats is given.Experiments are carried out based on the real-world network topology and real-world vulnerability information.The results show that compared with the existing attack graph-related techniques,this method can effectively discover the paths of potential attacks based on social network.
关 键 词:网络安全 知识图谱 社交网络威胁 属性攻击图 本体模型
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.145