首页 | 本学科首页   官方微博 | 高级检索  
     

基于Petri网的网络攻击流模型研究
引用本文:赵博夫,殷肖川. 基于Petri网的网络攻击流模型研究[J]. 计算机工程, 2011, 37(4): 158-160. DOI: 10.3969/j.issn.1000-3428.2011.04.056
作者姓名:赵博夫  殷肖川
作者单位:空军工程大学电讯工程学院,西安,710077
摘    要:针对网络攻击的智能组织实施问题,提出一种攻击流的概念,选用Petri网作为工具,对网络攻击流进行建模。在此基础上,对 3种基本网络攻击流模型进行分析,并结合IP欺骗攻击实例,分析其在IP欺骗攻击中的具体应用及其实现方式。实验结果表明,该模型既利于攻击者构建网络攻击方案,又能被计算机解析并组织实施网络攻击。

关 键 词:网络攻击流  Petri网建模  智能网络攻击

Research on Network Attack Flow Model Based on Petri Net
ZHAO Bo-fu,YIN Xiao-chuan. Research on Network Attack Flow Model Based on Petri Net[J]. Computer Engineering, 2011, 37(4): 158-160. DOI: 10.3969/j.issn.1000-3428.2011.04.056
Authors:ZHAO Bo-fu  YIN Xiao-chuan
Affiliation:(Telecommunication Engineering Institute,Air Force Engineering University,Xi’an 710077,China)
Abstract:Aiming at the issue of organization and implementation of intelligent network attack problem, this paper presents the concept of attack flow and uses Petri nets as a tool to model the flow of network attacks. On the basis, this paper analyses three kinds of basic network attack flow model. Based on the model, this paper gives an example of IP spoofing and analyses the specific application of the model and its implementation method in the IP spoofing attacks to show that the model is not only beneficial for the attacker to build network attack programs, but also helpful for the computer to analyse model and organize network attacks.
Keywords:network attack flow  modeling with Petri net  intelligent network attack
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号