计算机科学 ›› 2013, Vol. 40 ›› Issue (9): 156-158.

• 信息安全 • 上一篇    下一篇

基于智能化状态转移以及权限改进的攻击图构建方法

马彦图,王联国   

  1. 甘肃农业大学信息科学技术学院 兰州730070;甘肃农业大学信息科学技术学院 兰州730070
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金2011(61063028)资助

Attack Graph Construction Method Based on Intelligent State Transition and Permission Improvement

MA Yan-tu and WANG Lian-guo   

  • Online:2018-11-16 Published:2018-11-16

摘要: 针对当前攻击图在大范围网络应用中具有时间复杂度以及图形化描述不准确等缺陷,提出了一种基于智能化状态转移以及权限改进的攻击图构建方法:采用智能化状态转移途径构建攻击模型,依据该模型规划相应的攻击图,并在攻击图生成中引入了权限改进体制,该方法以主机间的连接分析为依据,根据网络攻击状态图中不同主机的原始权限,获取攻击权限的改进路径,能够针对网络变换情况调整主机的权限,进而确保相应网络的安全性,针对大规模复杂化网络攻击问题构建有效的攻击图,以确保整体网络的安全性和高效性。通过最终的仿真实验可得,该方法 构建 网络攻击图的时间较短,具备较低的时间复杂度和较高的扩展性,是一种高效的攻击图构建方法。

关键词: 攻击图,网络安全,智能化状态转移,权限改进 中图法分类号TP311文献标识码A

Abstract: In view of the current attack graph in a wide range of network applications with time complexity and not accurate graphical description,this paper put forward a attack graph construction method based on intelligent state transition as well as permission improvement,which adopts the intelligent state transition way to build attack model,based on the model of planning the corresponding attack graph generation algorithm,and introduces the permissions in the attack graph generation algorithm improvement system.The method based on host connections between analysis,based on network attack state graph and network of different host original permissions,access permissions attack improvement path,can adjust the host network transformation condition in the permissions,then ensure network security,corresponding to large-scale complicated network attacks effectively attack graph,to ensure the overall network security and high-efficiency.By the final simulation experiment,this method can decrease consumption of system CPU time to complete the construction of network attack graph,has lower time complexity and high scalability,is a highly efficient attack graph method.

Key words: Attack graph,Network security,Intelligent state transition,Permission improvement

[1] 王国玉,王会梅,陈志杰,等.基于攻击图的计算机网络攻击建模方法[J].国防科技大学学报,2009,1(4):74-80
[2] 陈春霞,黄皓.攻击模型的分析与研究[J].计算机应用研究,2005,2(7):115-118
[3] 司加全,张冰,苘大鹏,等.基于攻击图的网络安全性能增强策略制定方法[J].通信学报,2009,0(2):123-128
[4] 冯萍慧,连一峰,戴英侠,等.面向网络系统的脆弱性利用成本估算模型[J].计算机学报,2006,8(29):1375-382
[5] 朱明,殷建平,程杰仁,等.基于贪心策略的多目标攻击图生成方法[J].计算机工程与科学,2010,2(6):22-25
[6] 叶云,徐锡山,贾焰,等.基于攻击图的网络安全概率计算方法[J].计算机学报,2010,33(10):1987-1996
[7] 黄志宏,巫莉莉,张波.基于云计算的网络安全威胁及防范[J].重庆理工大学学报:自然科学版,2012,26(8):85-90

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!