首页 | 本学科首页   官方微博 | 高级检索  
     检索      

网络攻击图生成方法分析
引用本文:陆余良,宋舜宏,程微微,刘金红,施凡.网络攻击图生成方法分析[J].安徽大学学报(自然科学版),2010,34(4).
作者姓名:陆余良  宋舜宏  程微微  刘金红  施凡
作者单位:1. 电子工程学院,网络系,安徽,合肥,230037
2. 江南技术研究所,江苏,无锡,214083
摘    要:网络攻击图已成为网络安全分析的重要工具.论文对网络攻击图生成方法进行深入剖析,得到网络攻击图生成方法的重要特征属性和通用功能的实现框架,并应用部分属性对网络攻击图生成方法分类,总结了当前网络攻击图生成方法存在的问题及进一步研究的方向.

关 键 词:网络攻击图  分类  安全评估

Analysis of the generation approaches to network attack graphs
LU Yu-liang,SONG Shun-hong,CHENG Wei-wei,LIU Jin-hong,SHI Fan.Analysis of the generation approaches to network attack graphs[J].Journal of Anhui University(Natural Sciences),2010,34(4).
Authors:LU Yu-liang  SONG Shun-hong  CHENG Wei-wei  LIU Jin-hong  SHI Fan
Institution:LU Yu-liang1,SONG Shun-hong1,CHENG Wei-wei2,LIU Jin-hong1,SHI Fan1(1.Department of Network Engineering,Electronic Engineering Institute,Hefei 230037,China,2.Jiangnan Institute of Computing Technology,Wuxi 214083,China)
Abstract:Network attack graph has become one of the key tools for network security analysis.Based on the anatomy of generation approaches to attack graphs,this paper proposed important attributes and common functional framework for all these approaches.With some of the attributes as the metric,the approaches were classified.We concluded the current approaches and the research direction in the future.
Keywords:network attack graphs  classification  security evaluation  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号