首页 | 本学科首页   官方微博 | 高级检索  
     

一种权限提升图的生成算法
引用本文:李婧,张保稳. 一种权限提升图的生成算法[J]. 信息安全与通信保密, 2011, 9(12): 92-94
作者姓名:李婧  张保稳
作者单位:上海交通大学信息安全工程学院,上海,200240
摘    要:随着IT业的迅速发展,网络安全也越来越受到重视。一种可适应不同网络、不同初始主机权限的网络权限图的生成算法可以发现已有的网络安全漏洞,帮助网络管理人员提高网络的安全性。这种算法以主机间的连接为分析基础,根据网络状态及各主机的初始权限,得出权限提升路径,从而分析此网络的安全性,同时对网络变化和主机权限调整具有良好的适应性。

关 键 词:权限图  网络安全评估  权限提升

A Generation Algorithm of Privilege Escalation Graph
LI Jing,ZHANG Bao-wen. A Generation Algorithm of Privilege Escalation Graph[J]. China Information Security, 2011, 9(12): 92-94
Authors:LI Jing  ZHANG Bao-wen
Affiliation:LI Jing,ZHANG Bao-wen(School of Information Security Engineering,Shanghai Jiaotong University,Shanghai 200240,China)
Abstract:With the high-speed development of IT industry in these years, network security attracts much attention from people. A generation algorithm of privilege escalation graph adaptable to different networks or different initial privileges of hosts could find the existed network security loophole. This algorithm, based on connection of the host and in accordance with the network status and the initial privileges of the hosts, obtains the privilege escalation graph and thus analyzes the network security. The algorithm is of good adaptability to network variation and host privilege adjustments.
Keywords:privilege graph  network security assessment  privilege escalation
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号