首页 | 本学科首页   官方微博 | 高级检索  
     

攻击图展示技术研究
引用本文:苏华安,张怡.攻击图展示技术研究[J].现代电子技术,2010,33(19):94-96,100.
作者姓名:苏华安  张怡
作者单位:1. 国防科学技术大学,继续教育学院一队,湖南,长沙,410073
2. 国防科学技术大学,计算机学院,湖南,长沙,410073
摘    要:攻击图技术是一种基于模型的网络脆弱性评估方法。它通过对目标网络建模,以攻击规则对攻击者建模,然后根据二者之间的相互作用关系产生攻击图,展示目标网络内各个脆弱性之间的关系、脆弱性与网络安全配置之间的关系。早期的攻击图都是采用手工生成,速度慢效果差。为了方便研究人员使用攻击图分析目标网络安全状况,对攻击图的自动展示技术进行了研究。通过选用成熟的软件和设计合适的转换方法对攻击图进行解析,生成简洁清楚的攻击图,提高了攻击图的效能。

关 键 词:攻击图  展示技术  网络脆弱性评估  网络建模

Visual Technology of Attack Graph
SU Hua-an,ZHANG Yi.Visual Technology of Attack Graph[J].Modern Electronic Technique,2010,33(19):94-96,100.
Authors:SU Hua-an  ZHANG Yi
Affiliation:1. College of Continue Education, National University of Defense Technology, Changsha 410073, China; 2. School of Computer Science, National University of Defense Technology, Changsha 410073, China)
Abstract:Attack graph technology is a method of the model-based evaluation for network vulnerabilities. Through modeling the target network and modeling the attacker with attack rules, it gives attack graphs according to their relationship to reveal the relation of all the vulnerabilities in object network, and the relation between vulnerability and network security configuration. Early attack graph was produced by hand, which had a slow speed and dissatisfaction effect. In order to give facility for researchers to analyze the security condition of target network, a research is given to the visual technology of attack graph. Through the mature software and appropriate conversion technique to parse the attack graphs, the concision and clear attack graphs are generated and the efficiency of the attack graphs is improved.
Keywords:attack graph  visual technology  evaluation for network vulnerability  network modeling
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号