Computer Science ›› 2023, Vol. 50 ›› Issue (9): 35-43.doi: 10.11896/jsjkx.230500025
• Data Security • Previous Articles Next Articles
WANG Zibo1, ZHANG Yaofang1, CHEN Yilu1, LIU Hongri1,2, WANG Bailing1, WANG Chonghua3
CLC Number:
[1]LALLIE H S,DEBATTISTA K,BAL J.A review of attackgraph and attack tree visual syntax in cyber security[J].Computer Science Review,2020,35:100219-100259. [2]ZENITANI K.Attack graph analysis:an explanatory guide[J].Computers & Security,2022,126:103081-103101. [3]ZANG Y C,ZHU T Y,ZHU J H,et al.Domain-independent intelligent planning technology and its application to automated penetration testing oriented attack path discovery[J].Journal of Electronics & Information Technology,2020,42(9):2095-2107. [4]OU X,GOVINDAVAJHALA S,APPEL A W.MulVAL:ALogic-based Network Security Analyzer[C]//USENIX security symposium.2005:113-128. [5]INOKUCHI M,OHTA Y,KINOSHITA S,et al.Design procedure of knowledge base for practical attack graph generation[C]//Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security.2019:594-601. [6]STAN O,BITTON R,EZRETS M,et al.Extending AttackGraphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks[J].IEEE Transactions on Dependable and Secure Computing,2022,19(3):1936-1954. [7]SAHA D.Extending logical attack graphs for efficient vulnerability analysis[C]//Proceedings of the 15th ACM Conference on Computer and Communications Security.2008:63-74. [8]GHOSH N,GHOSH S K.A planner-based approach to generate and analyze minimal attack graph[J].Applied Intelligence,2012,36:369-390. [9]GAO W L,ZHOU T Y,ZHU J H,et al.Network attack path discovery method based on bidirectional ant colony algorithm[J].Computer Science,2022,49(S1):516-522. [10]BEZAWADA B,RAY I,TIWARY K.AGBuilder:an AI tool for automated attack graph building,analysis,and refinement[C]//IFIP Annual Conference on Data and Applications Security and Privacy.Cham:Springer,2019:23-42. [11]KAYNAR K,SIVRIKAYA F.Distributed attack graph generation[J].IEEE Transactions on Dependable and Secure Computing,2015,13(5):519-532. [12]CAO N,LV K,HU C.An attack graph generation method based on parallel computing[C]//Science of Cyber Security:First International Conference.Springer International Publishing,2018:34-48. [13]LIU Y Z,CHEN Y Z,GUO K,et al.Distributed process mining and graph segmentation for network attack modeling [J].Journal of Chinese Mini-Micro Computer Systems,2020,41(8):1732-1740. [14]SHAO T H,ZHANG H J,CHENG K,et al.Review of replanning in hierarchical task network [J].Journal of Systems Engineering and Electronics,2020,42(12):2833-2846. [15]HERRMANN J,KHO J,UÇAR B,et al.Acyclic partitioning of large directed acyclic graphs[C]//2017 17th IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing(CCGRID).IEEE,2017:371-380. [16]CHEN F,ZHANG Y,SU J S,et al.Two Formal Analyses of Attack Graphs [J].Journal of Software,2010,21(4):838-848. [17]Simple Hierarchical Ordered Planner(SHOP)[EB/OL].https://www.cs.umd.edu/projects/shop/. [18]Fast Forward(FF) [EB/OL].https://fai.cs.uni-saarland.de/hoffmann/ff.html. [19]SGPlan(Version 5.0)[EB/OL].https://wah.cse.cuhk.edu.hk/wah/programs/SGPlan/. [20]Fast Downward(FD)[EB/OL].https://github.com/aibasel/downward. [21]Partial Order Planning Forwards(POPF)(Version 2.0) [EB/OL].https://nms.kcl.ac.uk/planning/software/popf.html. [22]Heavy-edge matching [EB/OL] https://github.com/loukasa/graph-coarsening. |
[1] | ZENG Qingwei, ZHANG Guomin, XING Changyou, SONG Lihua. Intelligent Attack Path Discovery Based on Hierarchical Reinforcement Learning [J]. Computer Science, 2023, 50(7): 308-316. |
[2] | GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522. |
[3] | LUO Jun-ren, ZHANG Wan-peng, LU Li-na, CHEN Jing. Survey on Online Adversarial Planning for Real-time Strategy Game [J]. Computer Science, 2022, 49(6): 287-296. |
|