首页 | 本学科首页   官方微博 | 高级检索  
     

基于脆弱性关联模型的网络威胁分析
引用本文:王纯子,黄光球.基于脆弱性关联模型的网络威胁分析[J].计算机应用,2010,30(11):3046-3050.
作者姓名:王纯子  黄光球
作者单位:1. 西安建筑科技大学 管理学院,西安 710055;西安工程大学 管理学院,西安7100482. 西安建筑科技大学 管理学院
基金项目:陕西省重点学科建设专项资金资助项目,陕西自然科学基金,陕西省教育厅专项基金
摘    要:为了解决网络脆弱性建模存在的问题以及威胁评估方法中的不足,结合面向对象技术提出了基于扩展时间Petri网的脆弱性关联模型,通过定义攻击复杂度和危害度因素以及各评估指标的量化方法,给出了脆弱性关联模型的生成算法。结合网络威胁度的计算公式,运用改进的Dijkstra算法给出了无目标导向的网络威胁量化分析方法。该模型能够有效缩减状态空间的规模,适合对复杂网络攻击建模。实验证明了脆弱性关联模型的正确性及其优越的描述性能,基于该模型的威胁分析方法也更为合理、有效。

关 键 词:网络安全    面向对象    时间Petri网    脆弱性关联模型    威胁度
收稿时间:2010-05-18
修稿时间:2010-07-15

Network threat analysis based on vulnerability relation model
WANG Chun-zi,HUANG Guang-qiu.Network threat analysis based on vulnerability relation model[J].journal of Computer Applications,2010,30(11):3046-3050.
Authors:WANG Chun-zi  HUANG Guang-qiu
Affiliation:1. School of Management, Xi'an University of Architecture and Technology, Xi'an Shaanxi 710055, China; School of Management, Xi'an Polytechnic University, Xi'an Shaanxi 710048, China2.
Abstract:To solve the problems in network vulnerability model and threat analysis method, the paper proposed a network vulnerability relation model based on extended time Petri net. By introducing complexity and harmfulness of network attack, and defining each index's quantization, the generation algorithm of vulnerability relation model was proposed. Combined with network threat definition, a non-target oriented network threat analysis method based on improved Dijkstra algorithm was presented. The model was suitable for describing complicated network attack, which could reduce the scale of state space effectively. The experiment proves the correctness and performance of vulnerability relation model, and the threat analysis method based on the model is more reasonable and effective.
Keywords:network security                                                                                                                        object-oriented                                                                                                                        time Petri net                                                                                                                        vulnerability relation model                                                                                                                        threat
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号