期刊文献+

基于逻辑渗透图的网络安全分析模型 被引量:3

Network Security Analysis Model Based on Logic Exploitation Graph
在线阅读 下载PDF
导出
摘要 基于图论的方法被引入来进行分析多阶段、多主机之间的网络渗透行为,但非形式化的数据描述及状态爆炸等问题难以适应中大规模网络系统。通过分析多种网络渗透行为,提出一种基于逻辑渗透图的网络安全分析模型(LEG-NSAM)。通过分析对比看出,LEG-NSAM的形式化描述和推理机制有助于更加准确、清晰地评估安全风险。采用LEG及其简化算法能够对大规模网络进行有效安全分析。 Recent work in network security focuses on the fact that combinations of exploits are the typical means by which an attacker breaks into a network. This paper describes a new approach to represent and analyze network vulnerability. It proposes logic exploitation graph, which directly illustrates logical dependencies among exploitation goals and network configure. The logic exploitation graph generation tool builds upon LEG-NSA, a network security analyzer based on prolog logic programming, and demonstrates how to reason all exploitation paths using bottom-up and top-down evaluation algorithms in the prolog logic-programming engine. Experimental evidence show that the logic exploitation graph generation algorithm is very efficient.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第9期147-149,152,共4页 Computer Engineering
基金 国家自然科学基金资助项目(70401003 70771109)
关键词 安全分析 逻辑渗透图 逻辑推理 网络渗透 security analysis logic exploitation graph logic reasoning network exploitation
作者简介 钱猛(1968-),男,讲师、博士研究生,主研方向:知识管理和知识工程,网络安全技术;E-mail:qianmeng@nudt.edu.cn 毛捍东,讲师、博士; 姚莉,教授、博士 张维明,教授、博士
  • 相关文献

参考文献11

  • 1Ammann P,Wijesekera D,Kaushik S.Scalable Graph-based Network Vulnerability Analysis[C]//Proceedings of the 9th ACM Confefence on Computer and Comm.Security.New York,USA:ACM Press.2002:217-224.
  • 2Swiler L P,Phillips C,Gaylor T,A Graph-based Network Vulnerability Analysis System[R].Sandia National Laboratories,Albuquerque,USA.Technical Report:SAND97-3010/1.1998.
  • 3Swiler L P,Phillips C,Ellis D,et al,Computer-attack Graph Generation Tool[C]//Proceedings of the 2nd DARPA Information Survivability Conference&Exposition.Los Alamitos,Califoraia,USA:IEEE Computer Society.2001:307-321.
  • 4Sheyner O,Jha S,Wing J M.et al.Automated Generation and Analysis of Attack Graphs[C]//Proceedings of 2002 IEEE Symposium on Security and Privacy.Oakland,California,USA:IEEE Press.2002.
  • 5Jha S,Sheyner O,Wing J.Two Formal Analyses of Attack Graphs[C]//Proceedings of the 15th IEEE Computer Security Foundations Workshop.Cape Breton.Nova Scotia,Canada:IEEE Computer Society,2002:49-63.
  • 6Noel S,Jajodia S,O'Berry B,et al.Efficient Minimum-cost Network Hardening via Exploit Dependency Graphs[C]//Proceedings of the 19th Annual Computer Security Applications Conference.Las Vegas,Nevada,USA:[s.n.],2003.
  • 7Ritchey R.O'Berry B,Noel S.Representing TCP/IP Connectivity for Topological Analysis of Network Security[C]//Proceedings of the 18th Annual Computer Security Applications Conference.Las Vegas,Nevada,USA:[s.n.],2002.
  • 8Ou Xinming,Boyer W E McQueen M A.A Scalable Approach to Attack Graph Generation[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.[s.l.]:ACM Press,2006:336-345.
  • 9Ou Xinming,Govindavajhala S,Appel A W MulVAL:A logicbased Network Security Analyzer[C]//Proceedings of the 14th USENIX Socurity Symposium.Baltimore.MD.USA:[s.n.],2005.
  • 10Li Wei.An Approach tO Graph-based Modeling of Network Exploitations[D].Florida,USA:Department of Computer Science and Engineering,Mississippi State University,2005.

同被引文献15

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部