首页 | 本学科首页   官方微博 | 高级检索  
     

网络攻击规划模型及其生成算法
引用本文:郭春霞,刘增良,苗青.网络攻击规划模型及其生成算法[J].计算机工程与应用,2010,46(31):121-123.
作者姓名:郭春霞  刘增良  苗青
作者单位:1.北京科技大学 信息工程学院,北京 100083 2.国防大学 信息安全实验室,北京 100091 3.北京理工大学 软件学院,北京 100081
基金项目:国家自然科学基金重大项目,国家自然科学基金
摘    要:提出了一种网络攻击规划模型FSAPM。对攻击规划中的各种因素综合考虑和分析,包括与目标实现相关的认知观点、攻击功能、系统状态、人员能力级别,以及攻击因素间关系和衡量标准。采用因素模糊空间搜索算法获取攻击条件和功能集映射的测度,将其与获自于攻击单元和目标集的映射结果比较。根据人员操作能力提取与之相称的攻击规划和对应手段,通过实验验证了模型与算法效果,事实证明,将攻击实施的规划过程涉及的多因素进行考虑和分析更符合网络攻击的切实情况。

关 键 词:网络攻击  攻击规划  因素空间  
收稿时间:2009-3-11
修稿时间:2009-5-4  

Network attack planning model and its generating algorithm
GUO Chun-xia,LIU Zeng-liang,MIAO Qing.Network attack planning model and its generating algorithm[J].Computer Engineering and Applications,2010,46(31):121-123.
Authors:GUO Chun-xia  LIU Zeng-liang  MIAO Qing
Affiliation:1.College of Information Engineering,University of Science and Technology Beijing,Beijing 100083,China 2.Information Security Laboratory of National Defense Academy,Beijing 100091,China 3.College of Software Engineering,Beijing Institute of Technology,Beijing 100081,China
Abstract:A Factor Space Attacks Planning Model(FSAPM) is proposed.All kinds of factors in attacks planning are considered and analyzed, including the realization of the objectives related to cognitive point of view, the offensive functional supports,the system state,personnel capacity levels, as well as the relationship between offensive factors and criteria.Factor fuzzy space search algorithm is used to gain measurement for attack conditions and function sets mapping, then compared to the mapping results from attack units and goal set.According to the staff ability, some operation commensurated with the attack planning and the corresponding means are extracted.Finally an experimental verification of the model and algorithm is given, which proves that considering and analyzing the attack planning process involved many factors will accord the practical situation of network attacks better.
Keywords:network offensive  attack planning  factor space
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号