首页 | 本学科首页   官方微博 | 高级检索  
     

基于攻击树的网络攻击建模方法
引用本文:卢继军,黄刘生,吴树峰. 基于攻击树的网络攻击建模方法[J]. 计算机工程与应用, 2003, 39(27): 160-163
作者姓名:卢继军  黄刘生  吴树峰
作者单位:中国科学技术大学计算机科学技术系,合肥,230027
基金项目:国家973重点基础研究发展规划资助项目(编号:G1998030403),中科院支持高水平大学建设重点项目
摘    要:攻击树(AttackTree)是一种具有树表示结构的网络攻击建模工具。它具有结构化、可重用的优点。已有一些工作在它的基础上展开。但总的来说,现有的研究都着重于针对具体的攻击事件进行建模,在利用攻击树进行分析时缺乏系统性和整体性,难以对攻击树进行有效的利用。该文利用攻击树从系统的角度来对攻击进行建模,并尝试利用建模后得到的攻击树对系统整体的安全性进行分析与评估;此外,通过对攻击过程进行阶段划分,大大降低了构造出的攻击树的复杂度,使得攻击树更易于使用、分析和维护。实例分析表明,该方法能很好地刻画网络攻击的特征,可以为系统的安全分析和评估提供比较令人满意的指导,具有较好的实用性。

关 键 词:攻击树  攻击建模  安全分析  入侵检测
文章编号:1002-8331-(2003)27-0160-04
修稿时间:2002-11-01

An Attack Tree Approach for Network Intrusion Modeling
Lu Jijun Huang Liusheng Wu Shufeng. An Attack Tree Approach for Network Intrusion Modeling[J]. Computer Engineering and Applications, 2003, 39(27): 160-163
Authors:Lu Jijun Huang Liusheng Wu Shufeng
Abstract:As the frequency and complexity Internet attacks increase,systems administrators need more sophisticated tools to warn and direct their responses.The foundation for any such effort is a coherent model of exploits and intrusions that is rich enough to capture the behavior and composition of multi-stage attacks.Attack tree is a good analysis tool for network attacks modeling.Previous works mainly focus on using attack tree to modeling specific attack events.In this paper,attack tree is used to model the attacks from a system's perspective.By dividing attacks into several stages and constructing an attack tree for each stage,people can decrease the complexity of the construction of attack trees.Further,these attack trees are used in system's security analysis and the requirements analysis of an intrusion detection system.From the result of the experience,this approach shows good performance and is practical in use.
Keywords:Attack Tree  Attack Modeling  Security Analysis  Intrusion Detection  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号