首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于贪心策略的攻击图模型
引用本文:袁桓,陆余良,宋舜宏,黄晖. 一种基于贪心策略的攻击图模型[J]. 计算机与现代化, 2010, 0(7): 63-67. DOI: 10.3969/j.issn.1006-2475.2010.07.018
作者姓名:袁桓  陆余良  宋舜宏  黄晖
作者单位:合肥电子工程学院网络工程系,安徽,合肥,230037
摘    要:通过分析网络攻击者在攻击过程中常采取的各种贪心策略,提出一种基于贪心策略的攻击图建模和生成方法,能够有效解决基于攻击图的网络安全分析中存在的规模和环路问题。实验表明使用该方法可明显减少所生成的攻击图的规模且解决了环路问题,同时保留了关键漏洞和攻击路径信息,提高了网络安全分析效率和可视化效果。

关 键 词:贪心策略  攻击图  网络安全分析

An Attack Graph Model Using Greedy Policy
YUAN Huan,LU Yu-liang,SONG Shun-hong,HUANG Hui. An Attack Graph Model Using Greedy Policy[J]. Computer and Modernization, 2010, 0(7): 63-67. DOI: 10.3969/j.issn.1006-2475.2010.07.018
Authors:YUAN Huan  LU Yu-liang  SONG Shun-hong  HUANG Hui
Affiliation:(Department of Network Engineering,Electronic Engineering Institute,Hefei 230037,China)
Abstract:By analyzing the greedy policies attackers used in their intrusions frequently,the paper proposes an attack graph modeling methodology using greedy policy,which can solve two issues in the process of network security analysis,namely scalability and cycle.The experiment results indicate that AGGP provides a novel solution to the problem of efficient attack graph representation and analysis with less nodes and edges generated,and can help network administrators to find the key vulnerabilities and attack paths effectively and visually.
Keywords:greedy policy  attack graphs  network security analysis
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号