首页 | 本学科首页   官方微博 | 高级检索  
     

基于脆弱点利用关联的攻击图优化方法
引用本文:李庆朋,郑连清,张串绒,杨仝.基于脆弱点利用关联的攻击图优化方法[J].计算机工程,2012,38(21):129-132.
作者姓名:李庆朋  郑连清  张串绒  杨仝
作者单位:1. 空军工程大学电讯工程学院,西安,710077
2. 空军工程大学电讯工程学院,西安710077;清华大学计算机科学与技术系,北京100084
基金项目:国家自然科学基金资助项目
摘    要:现有的攻击图技术忽略了脆弱点之间的关联性,且大规模网络攻击图过于复杂。为解决上述问题,提出一种基于脆弱点利用(VE)关联的攻击图优化方法。对生成的攻击图进行预处理后,利用VE之间的关联性消除大规模网络攻击图中的冗余,并通过横向关联和纵向关联简化攻击图。仿真实验结果表明,该方法可以较好地优化攻击图的表达方式,为进行网络安全评估打下良好基础。

关 键 词:网络安全  脆弱点利用  攻击图  横向关联  纵向关联  安全评估
收稿时间:2011-11-01

Optimization Method for Attack Graph Based on Vulnerability Exploit Correlation
LI Qing-peng , ZHENG Lian-qing , ZHANG Chuan-rong , YANG Tong.Optimization Method for Attack Graph Based on Vulnerability Exploit Correlation[J].Computer Engineering,2012,38(21):129-132.
Authors:LI Qing-peng  ZHENG Lian-qing  ZHANG Chuan-rong  YANG Tong
Affiliation:1,2(1.Telecommunication Engineering Institute,Air Force Engineering University,Xi’an 710077,China;2.Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China)
Abstract:Traditional attack graphs usually neglect the vulnerability correlation in network, and large-scale attack graphs are too complex. To solve the problems above, an optimization method for attack graph based on Vulnerability Exploit(VE) correlation is proposed. It eliminates the redundancy of attack graph by using the correlation between VE, and optimizes attack graph by transversal and vertical correlation, after pretreatment of the attack graph are generated. Experimental results show that the method can optimize the expression of attack graph better, and lay a good foundation for network security evaluation.
Keywords:network security  Vulnerability Exploit(VE)  attack graph  transversal correlation  vertical correlation  security evaluation
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号