%0 Journal Article %T Survey of Attack Graph Technique
攻击图技术研究进展 %A CHEN Feng %A MAO Han-dong %A ZHANG Wei-ming %A LEI Chang-hai %A
陈锋 %A 毛捍东 %A 张维明 %A 雷长海 %J 计算机科学 %D 2011 %I %X The network attack techniques arc being more diversified, and intelligent, an attacker can often infiltrate a seemingly well-guarded network system using multi-step attacks by exploiting sequences of related vulnerabilities. As the novel vulnerability assessment technique, the attack graph technique analyzes the interaction between the target network and the attacker through the models of these two agents, generates attack graph to show possible attack paths. Because this technology has the capacity to automatically discover the unknown system vulnerabilities and the relationship between vulnerabilities, it is currently a hot subject of research. "l}he attack graph technique has experienced the stage of manual analysis and the stage of the automatic analysis of small-scale network, and is currently in the way of the automatic analysis of large-scale network. In this paper, the development of attack graph technique was summarized and challenges arising from the current research were discussed and some suggestions for the future research work were put forward. %K Vulnerability assessment %K Attack graphs %K Modeling networks %K Modeling attackers
脆弱性分析,攻击图,网络建模,攻击者建模 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=17DDCED190714E79A108C0A4E5F44245&yid=9377ED8094509821&vid=16D8618C6164A3ED&iid=708DD6B15D2464E8&sid=59906B3B2830C2C5&eid=13553B2D12F347E8&journal_id=1002-137X&journal_name=计算机科学&referenced_num=0&reference_num=0