首页 | 官方网站   微博 | 高级检索  
     

基于攻击期望的双模攻击图生成算法
引用本文:赵毅寰,高静,郑力文.基于攻击期望的双模攻击图生成算法[J].航空兵器,2011(3):31-35,46.
作者姓名:赵毅寰  高静  郑力文
作者单位:1. 中国空空导弹研究院,河南洛阳,471009
2. 中国空空导弹研究院,河南洛阳471009;北京航空航天大学电子信息工程学院,北京100191
摘    要:针对网络中心战中已有的攻击图生成算法不考虑对攻击效果的期望,不能适应多种网络脆弱性分析目标的不足,提出了双模攻击图(Two-Mode Attack Graph,TMAG)的概念.该方法以攻击者在网络中所有主机上具有的权限作为状态,以网络弱点和连接情况为辅助,设定网络攻击的单调性,能自动生成精简状态空间的完备攻击图和关键...

关 键 词:网络中心战  攻击图  脆弱性  攻击效果  拓扑

Generation of Two-Mode Attack Graph Based on Attack Expectation
ZHAO Yi-huan,GAO Jing,ZHENG Li-wen.Generation of Two-Mode Attack Graph Based on Attack Expectation[J].Aero Weaponry,2011(3):31-35,46.
Authors:ZHAO Yi-huan  GAO Jing  ZHENG Li-wen
Affiliation:ZHAO Yi-huan1,GAO Jing1,2,ZHENG Li-wen1(1.China Airborne Missile Academy,Luoyang 471009,China,2.School of Electronics and Information Engineering,Beijing University of Aeronautics and Astronautics,Beijing 100191,China)
Abstract:As the attack graph generation algorithm in the network centric warfare doesn't take the attack expectation into consideration,and can't satisfy the purpose of network vulnerability analysis,this paper proposes the two-mode attack graph(TMAG)algorithm.With this method,the attacker's authority in all hosts in the network is chosen as the net status,and the network weakness and the interconnections between hosts as the assistance.On the assumption that all attack actions are monotonic,an exhaustive attack gra...
Keywords:network centric warfare  attack graph  vulnerability  attack effect  topology  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号