首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于时间Petri网的渗透测试攻击模型研究
引用本文:罗森林,张驰,周梦婷,潘丽敏.基于时间Petri网的渗透测试攻击模型研究[J].北京理工大学学报,2015,35(1):92-96.
作者姓名:罗森林  张驰  周梦婷  潘丽敏
作者单位:北京理工大学信息系统及安全对抗实验中心,北京,100081;北京理工大学信息系统及安全对抗实验中心,北京,100081;北京理工大学信息系统及安全对抗实验中心,北京,100081;北京理工大学信息系统及安全对抗实验中心,北京,100081
基金项目:北京理工大学科技创新计划重大项目(2011CX01015);国家242计划项目(2005C48)
摘    要:针对攻击模型会因为描述的攻击参数不完备,导致实际应用价值降低的问题,提出一种以漏洞为基本粒度,基于时间Petri网的渗透测试攻击模型及构建方法. 该方法对已知漏洞列表构建单漏洞利用模型,通过整合形成渗透测试攻击模型,并提供快速和稳定的漏洞利用方案选择算法,获得相应攻击方案,以及完成一次渗透攻击所需最短时间. 实验结果表明,该模型及算法可以有效地描述攻击时间和攻击稳定性,可实际应用于渗透测试. 

关 键 词:渗透测试  攻击模型  时间Petri网  漏洞利用
收稿时间:2014/2/21 0:00:00

Researches on Penetration Attacking Model Based on Timed Petri Nets
LUO Sen-lin,ZHANG Chi,ZHOU Meng-ting and PAN Li-min.Researches on Penetration Attacking Model Based on Timed Petri Nets[J].Journal of Beijing Institute of Technology(Natural Science Edition),2015,35(1):92-96.
Authors:LUO Sen-lin  ZHANG Chi  ZHOU Meng-ting and PAN Li-min
Institution:Information System and Security & Countermeasures Experimental Center, Beijing Institute of Technology, Beijing 100081, China
Abstract:Penetration test is a generally acknowledged and effective security testing method, while the phase of attack is the significant execution of penetration test. Due to incomplete attack parameters, the attacking model can often not be applied in practical. A penetration attacking model based on timed Petri nets was put forward in this paper, the basic granularity of which was vulnerability. First, the single vulnerability exploitation model was constructed by a list of known vulnerabilities. Then the penetration attacking model was constructed by integrating them, and the rapid and stable vulnerability exploitation selection algorithms were proposed. The corresponding attacking schemes as well as the shortest time that completing a penetration attack requires can be obtained. The experimental results show that the model can describe the attacking time and stability effectively. Furthermore, the method can be applied to the penetration test in practical.
Keywords:penetration test  attacking model  timed Petri nets  vulnerability exploitation
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《北京理工大学学报》浏览原始摘要信息
点击此处可从《北京理工大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号