首页 | 本学科首页   官方微博 | 高级检索  
     

融合社交网络威胁的攻击图生成方法
引用本文:杨艳丽,宋礼鹏.融合社交网络威胁的攻击图生成方法[J].计算机工程,2021,47(5):104-116.
作者姓名:杨艳丽  宋礼鹏
作者单位:中北大学 大数据学院, 太原 030051
摘    要:针对现有攻击图生成和分析方法多数未考虑社交网络威胁的问题,提出一种基于知识图谱融合社交网络威胁的攻击图生成方法。根据攻击图的构建需求和收集的内网环境数据,设计融合社交网络威胁的网络安全本体模型和知识图谱,以实现对社交网络和物理网络数据的关联分析以及对攻击图输入信息的扩展,基于知识图谱采用广度优先搜索算法生成融合社交网络威胁的攻击图,并给出内部社交网络威胁的攻击成功率计算方法。基于真实网络拓扑和脆弱性信息的实验结果表明,与现有攻击图的相关方法相比,该方法可有效发现网络中潜在的借助社交网络入侵的攻击路径。

关 键 词:网络安全  知识图谱  社交网络威胁  属性攻击图  本体模型  
收稿时间:2020-11-27
修稿时间:2021-01-15

Attack Graph Generation Method Integrating Social Network Threats
YANG Yanli,SONG Lipeng.Attack Graph Generation Method Integrating Social Network Threats[J].Computer Engineering,2021,47(5):104-116.
Authors:YANG Yanli  SONG Lipeng
Affiliation:School of Big Data, North University of China, Taiyuan 030051, China
Abstract:The existing methods for attack graph generation and analysis do not consider the threats of social network.This paper proposes a method to generate an attack graph integrating social network threats based on a knowledge graph.According to attack graph construction requirements and the collected intranet data,a network security ontology model and knowledge graph that integrate social network threats are designed.The model and the knowledge graph enable the analysis of the association between social network data and physical network data,as well as the extension of the input information of the attack graph.Then based on the knowledge graph,a breadth-first search algorithm is used to generate an attack graph that integrates social network threats,and a method for calculating the attack success rate of internal social network threats is given.Experiments are carried out based on the real-world network topology and real-world vulnerability information.The results show that compared with the existing attack graph-related techniques,this method can effectively discover the paths of potential attacks based on social network.
Keywords:network security  knowledge graph  social network threats  attribute attack graph  ontology model
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号