期刊文献+

一种基于图论的网络安全分析方法研究 被引量:9

Study on Network Security Analysis Method Based on Graph
下载PDF
导出
摘要 随着信息技术安全问题的日益突出,对网络系统进行安全分析日益重要。提出了一种基于图论的网络安全分析方法NEG-NSAM,在进行网络参数抽象和脆弱性关联分析的基础上,构造网络渗透图模型,刻画了威胁主体逐步渗透安全目标的动态过程。针对大规模网络环境,提出了渗透图简化算法。最后,运用NEG-NSAM方法进行了实例分析,验证该方法的可行性和有效性。 As information technology security issues become more prominent,the network system security analysis is becoming increasingly important.The paper presents NEG-NSAM,a network security analysis method.Based on network parameters abstract and vulnerability correlation analysis,the network exploitation graph model was constructed,and the dynamic process of a gradual infiltration of the main threats to security objectives was characterized.For large-scale network environment,the simplified algorithm of network e...
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2008年第2期97-101,共5页 Journal of National University of Defense Technology
基金 国家自然科学基金资助项目(70371008)
关键词 安全分析 网络渗透 渗透图 网络参数抽象 security analysis network exploit exploitation graph network parameter abstract
  • 相关文献

参考文献16

  • 1[1]Schneier B.Attack Trees[J].Dr.Dobb's Journal,1999,24(12):21-29.
  • 2[2]Dacier M,Deswartes Y,Kaaniche M.Quantitive Assessment of Operational Security Models and Tools[R].Technical Report Research Report 96493,LAAS,May 1996.
  • 3[3]Ortalo R,Deswarte Y,Kaaniche M.Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security[J].IEEE Transactions on Software Engineering,1999,25(5):633-650.
  • 4[4]Swiler L P,Phillips C,Gaylor T.A Graph-based Network-vulnerability Analysis System[R].Technical Report SAND97-3010/1,Sandia National Laboratories,Albuquerque,New Mexico and Livermore,California,1998.
  • 5[5]Jha S,Sheyner O,Wing J.Two Formal Analyses of Attack Graphs[C]//Proceedings:15th IEEE Computer Security Foundations Workshop (CSFW'15),Cape Breton,Nova Scotia,Canada,IEEE Computer Society,2002:49-63.
  • 6[6]Ritchey R W,Ammann P.Using Model Checking to Analyze Network Vulnerabilities[C]//Proceedings:IEEE Computer Society Symposium on Security and Privacy (S&P 2000),Oakland,California,IEEE Computer Society,2000:156-165.
  • 7[7]汪立东.一种量化的计算机系统和网络安全风险评估方法[D].哈尔滨:哈尔滨工业大学,2002.
  • 8胡华平,刘波,钟求喜,庞立会.网络安全脆弱性分析与处置系统的研究与实现[J].国防科技大学学报,2004,26(1):36-40. 被引量:11
  • 9张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 10汪渊,蒋凡,陈国良.基于图论的网络安全分析方法研究与应用[J].小型微型计算机系统,2003,24(10):1865-1869. 被引量:19

二级参考文献36

  • 1董豆豆,周经伦,冯静,龚时雨,周忠宝.基于概率风险的系统安全性分析[J].国防科技大学学报,2005,27(1):98-101. 被引量:7
  • 2亨利EJ.可靠性工程与风险分析[M].北京:原子能出版社,1988..
  • 3郭长国.[D].国防科技大学,1999.
  • 4Lowe G, Roscoe B. Using CSP to detect errors in the TMN protocol)[J]. IEEE Transactions on Software Engineering, 1997, 23(10), 659 -669.
  • 5Robert Thorhuus. Software fault injection testing [J]. Ericsson Telecom, Stockholm, Sweden, 2000,2.
  • 6John D Howard. An analysis of security incident on the internet[D]. Carnegie Mellon University, West Lafayette , USA, 1997.
  • 7Rodolphe Ortalo, Yves Deswarte, Mohamed Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security [R]. LAAS Report 96369, 1997,1.
  • 8Mare Daeier, Yves Deswarte, Mohamed Kaaniehe. Quantitative assessment of operational security: models and tools[R]. LAAS Research Report 96493, 1996, 5.
  • 9Steve Miksell, Scott Nainis W, Henry M James. Security vulnerability assessment tools for internet applications[Z]. White Paper, Information Technology Support Center, 2001,3.
  • 10John D McLean. Security model [J]. Encyclopedia of Software Engineering[M] ,Wiley & Sons. Inc , 1994.

共引文献112

同被引文献61

引证文献9

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部