首页 | 官方网站   微博 | 高级检索  
     

基于Petri网的APT攻击模型生成方法
引用本文:杜镇宇,刘方正,李翼宏.基于Petri网的APT攻击模型生成方法[J].计算机应用研究,2019,36(7).
作者姓名:杜镇宇  刘方正  李翼宏
作者单位:国防科技大学电子对抗学院,国防科技大学电子对抗学院,国防科技大学电子对抗学院
基金项目:国家自然科学基金(U1636201)
摘    要:在严峻的APT(Advanced Persistent Threat)攻击防御背景下,针对现有网络攻击建模方法无法反映APT攻击的攻击特点,建立了基于Petri网的APT攻击模型。借助Petri网,首先针对APT攻击的特点及生命周期,建立APT攻击的基本Petri网模型;然后设计并实现APTPN(Advanced Persistent Threat Petri Nets)模型的生成算法,针对具体的APT攻击生成其完整的攻击路径;最后,实验通过模拟极光攻击验证了算法的有效性及正确性。

关 键 词:Petri网  APT  APTPN  建模  攻击路径
收稿时间:2018/1/24 0:00:00
修稿时间:2019/5/21 0:00:00

Modeling Method for Advanced Persistent Threat Based on Petri
Du Zhenyu,Liu Fangzheng and Li Yihong.Modeling Method for Advanced Persistent Threat Based on Petri[J].Application Research of Computers,2019,36(7).
Authors:Du Zhenyu  Liu Fangzheng and Li Yihong
Affiliation:National University of Defense Technology University,Electronic confrontation Institute,HeFei,China,,
Abstract:Against the background of severe APT attack defense, aiming at the fact that the existing network attack modeling methods can not reflect the attack features of APT attacks, an APT attack model based on Petri nets is established. With Petri nets, the basic Petri net model of APT attacks is first established according to the characteristics and life cycle of APT attacks. Then, the algorithm of generating APTPN (Advanced Persistent Threat Petri Nets) model is designed and implemented to generate its complete attack path against a specific APT attack Finally, experiments verify the effectiveness and correctness of the algorithm by simulating auroral attacks
Keywords:petri nets  advanced persistent threat  advanced persistent threat petri nets  modeling  attack path
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号