用户名: 密码: 验证码:
拓扑漏洞分析及其应用研究
详细信息    查看官网全文
摘要
发现网络漏洞,减少漏洞危害已成为网络系统安全的研究重点。本文从拓扑漏洞分析技术的产生开始,以网络系统安全为目标,围绕漏洞的发现、分析,从分析方法、表示方法和模型三个方面总结阐述拓扑漏洞分析技术的组成和内涵,从网络系统安全、网络安全态势感知和指挥控制系统三个方面明确拓扑漏洞分析技术的应用。
The key point of network security research is to find out the network vulnerability and reduce the vulnerability. To beginning with TVA, we aim at network system security, around vulnerability discovery and analysis, from the three aspects of analysis method, method and model of topological vulnerability analysis summarizes the composition and content of technology, the application of network security, network security situation awareness and command control system in three aspects.
引文
[1]A B,BLW W.Situation awareness in emergency medical dispatch[J].International Journal of Human-Computer Studies,2004,61(4):421-452.
    [2]Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities[C].IEEE Symposium on Security and Privacy,2000.
    [3]Patsos D,Mitropoulos S,Douligeris C.Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system[J].Information Management&Computer Security,2010,18(4):291-309.
    [4]李庆朋,王布宏,王晓东,等.基于安全状态约简的攻击图生成方法[J].计算机工程与设计,2013,34(5):1589-1593.
    [5]谢丽霞,王亚超,于巾博.基于神经网络的网络安全态势感知[J].清华大学学报,2013,53(12):1750-1760.
    [6]Swarup V,Jajodia S,Pamula J.Rule-Based Topological Vulnerability Analysis:Computer Network Security,selected papers from the 3rd International Workshop on Mathematical Methods,Models,and Architectures for Computer Network Security,2005.
    [7]Zakeri R,Shahriari H R,Jalili R,et al.Modeling TCP/IP Networks Topology for Network Vulnerability Analysis:International Symposium on Telecommunications,2005.
    [8]陈靖,王冬海,彭武.基于动态攻击图的网络安全实时评估[J].计算机科学,2013,40(2):133-138.
    [9]叶云,徐锡山,齐治昌,等.大规模网络中攻击图自动构建算法研究[J].计算机研究与发展,2013,50(10):2133-2139.
    [10]Jajodia S,Noel S.Topological Vulnerability Analysis:A Powerful New Approach For Network Attack Prevention,Detection,and Response[J].World Scientific,2008.
    [11]高妮,高岭,贺毅岳,等.基于贝叶斯攻击图的动态安全风险评估模型[J].四川大学学报,2016,48(1):111-118.
    [12]陈小军,方滨兴,谭庆丰,等.基于概率攻击图的内部攻击意图推断算法研究[J].计算机学报,2014,37(1):62-72.
    [13]王秀娟,孙博,廖彦文,等.贝叶斯属性攻击图网络脆弱性评估[J].北京邮电大学学报,2015,38(4):106-112.
    [14]程叶霞,姜文,薛质,等.攻击图的网络威胁自动建模方法研究[J].通信技术,2012,45(9):86-90.
    [15]谢丽霞,王亚超.网络安全态势感知新方法[J].北京邮电大学学报,2014,37(5):31-35.
    [16]李洪成,付钰,叶清,等.基于粗糙集定权的网络安全态势要素提取方法[J].计算机与数字工程,2014,42(3):436-439.
    [17]龚俭,臧小东,苏琪,等.网络安全态势感知综述[J].软件学报,2017,28(4):1-17.
    [18]叶健健.基于贝叶斯方法的网络安全态势感知方法研究[D].湖南工业大学,2015.
    [19]刘效武,王慧强,吕宏武,等.网络安全态势认知融合感控模型[J].软件学报,2016,27(8):2099-2114.
    [20]高妮,高岭,贺毅岳,等.基于贝叶斯攻击图的最优安全防护策略选择模型[J].计算机工程与应用,2016,52(11):125-130.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700