首页 | 本学科首页   官方微博 | 高级检索  
     

网络脆弱性建模方法研究
引用本文:毛捍东,陈锋,张维明.网络脆弱性建模方法研究[J].计算机工程与应用,2007,43(15):1-5.
作者姓名:毛捍东  陈锋  张维明
作者单位:国防科技大学 信息系统与管理学院,长沙 410073
摘    要:在计算机安全领域,特别是网络安全领域,对网络系统脆弱性进行建模十分重要,其最终目的就是指导安全管理员仿真攻击场景、分析网络脆弱性之间的关联关系以及建立防御机制。阐述了网络脆弱性的概念及其建模方法发展历程,介绍了攻击树、攻击图、渗透图、特权提升图、Petri net、状态图、需求/产出模型等几种典型的脆弱性建模方法,最后总结了今后的发展方向。

关 键 词:脆弱性建模  攻击树  攻击图  渗透图  Petrinet
文章编号:1002-8331(2007)15-0001-05
修稿时间:2007-01

Survey of network vulnerability modeling method
MAO Han-dong,CHEN Feng,ZHANG Wei-ming.Survey of network vulnerability modeling method[J].Computer Engineering and Applications,2007,43(15):1-5.
Authors:MAO Han-dong  CHEN Feng  ZHANG Wei-ming
Affiliation:School of Information System and Management,NUDT,Changsha 410073,China
Abstract:In the field of computer security,particularly network security,network vulnerability of the model is very important.The ultimate aim is to guide security administrator simulating attack scenarios,analysing the relationships between network vulnerability and building defensive mechanisms.This paper discusses the concept of network vulnerability and modeling development process,introduces some typical vulnerability modeling methods,induding the attack on the tree,plan attacks, infiltration map,privileges upgrade plan,Petri net,the state plans,requires/provides model.In conclusion,the paper summarizes the future direction of development.
Keywords:vulnerability modeling  attack tree  attack graph  exploit graph  Petri net
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号