首页 | 本学科首页   官方微博 | 高级检索  
     

攻击图算法在入侵防御系统中的应用
引用本文:罗智勇,孙广路,刘嘉辉,王卫兵. 攻击图算法在入侵防御系统中的应用[J]. 云南大学学报(自然科学版), 2012, 0(3): 271-275,284
作者姓名:罗智勇  孙广路  刘嘉辉  王卫兵
作者单位:哈尔滨理工大学计算机科学与技术学院
基金项目:国家自然科学基金资助项目(60903083);黑龙江省教育厅海外学人科研资助项目(1251HO18)
摘    要: 针对目前及时发现网络漏洞,增强网络安全十分困难等问题,提出了基于攻击图的入侵防御方法.该方法通过生成全局网络攻击图算法来建立网络初始攻击图,并调用攻击图优化算法来去除全局攻击图中不合理路径,达到简化攻击图目的.最后,通过计算攻击图各状态节点损失度算法来为管理人员提供优化网络安全策略的依据.实验证明,这种入侵防御方法合理有效,并具有简单易行等优点.

关 键 词:网络安全  入侵防御  攻击图  漏洞  状态节点

Application of attack graphs algorithms in intrusion prevention system
LUO Zhi-yong,SUN Guang-lu,LIU Jia-hui,WANG Wei-bing. Application of attack graphs algorithms in intrusion prevention system[J]. Journal of Yunnan University(Natural Sciences), 2012, 0(3): 271-275,284
Authors:LUO Zhi-yong  SUN Guang-lu  LIU Jia-hui  WANG Wei-bing
Affiliation:(School of Computer Science and Technology,Harbin University of Science and Technology,Harbin 150080,China)
Abstract:Now it was found fnat network loopholes in time and enhanced network security was very difficult.Aimed at these problems,the paper provided a method of intrusion prevent based on attack graphs.This method built network initial attack graphs by creating global network attack graphs algorithm.And we called attack graphs optimization algorithm to remove unreasonable paths in global attack graphs,so the attack graphs was simplified.Finally,by the algorithm of calculating attack graphs state node’s loss degree,webmaster optimized the network security policy.Experiments proved that this intrusion prevent method was reasonable and effective,and had simple and easy to do etc.
Keywords:network security  intrusion prevent  attack graphs  loophole  state node
本文献已被 CNKI 等数据库收录!
点击此处可从《云南大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《云南大学学报(自然科学版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号