首页 | 本学科首页   官方微博 | 高级检索  
     

基于贪心策略的多目标攻击图生成方法
引用本文:朱明,殷建平,程杰仁,刘强,林加润.基于贪心策略的多目标攻击图生成方法[J].计算机工程与科学,2010,32(6):22-25.
作者姓名:朱明  殷建平  程杰仁  刘强  林加润
作者单位:1. 国防科学技术大学计算机学院,湖南,长沙,410073
2. 国防科学技术大学计算机学院,湖南,长沙,410073;湘南学院,湖南,郴州,423000
基金项目:国家自然科学基金,湖南省教育厅资助项目,公安部应用创新计划 
摘    要:为解决网络脆弱性分析中攻击图生成方法存在的状态组合爆炸问题,使生成的攻击图能用于网络中多个目标主机的脆弱性分析,本文提出了一种基于贪心策略的多目标攻击图生成方法。该方法引入节点关联关系,采用贪心策略精简漏洞集,从所有攻击路径中选取使攻击者以最大概率获取网络节点权限的攻击路径,生成由这些攻击路径所构成的攻击图。算法分析和实验结果表明,该方法的时间和空间复杂度都是网络节点数和节点关联关系数的多项式级别,较好地解决了状态组合爆炸的问题,生成的攻击图覆盖了攻击可达的所有节点,能够用于网络中多个目标主机的脆弱性分析。

关 键 词:网络脆弱性分析  节点关联关系  多目标攻击图  贪心策略
收稿时间:2009-11-15
修稿时间:2010-02-09

A Method of Generating the Multi-Targets Attack Graphs Based on Greedy Policies
ZHU Ming,YIN Jian-ping,CHENG Jie-ren,LIU Qiang,LIN Jia-run.A Method of Generating the Multi-Targets Attack Graphs Based on Greedy Policies[J].Computer Engineering & Science,2010,32(6):22-25.
Authors:ZHU Ming  YIN Jian-ping  CHENG Jie-ren  LIU Qiang  LIN Jia-run
Affiliation:(1.School of Computer Science,National University of Defense Technology,Changsha 410073; 2.Xiangnan University,Chenzhou 423000,China)
Abstract:In order to avoid the combination of states occurred in the generation of attack graphs while analyzing network vulnerabilities and to make the attack graphs available for analyzing the multi targets’ vulnerabilities, a new method of generating attack graphs based on greedy policies is proposed. The method introduces the  network node correlations, uses greedy policies to reduce the amount of vulnerabilities, chooses the attack routes that allow attackers to gain network node priority with the greatest potential and generate the attack graphs with those attack routes. The algorithm analysis and the experimental results show that the cost of time and space of the method is the polynomial level of the network node number and the network node correlation number, which means it has solved the problem of the great combination of states effectively. The attack graph it generates covers all network nodes that attackers can access, so the method can be used to analyze the multi targets’ vulnerabilities.
Keywords:network vulnerability analysis  network node correlation  multi targets attack graph  greedy policy
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号