%0 Journal Article %T Two Formal Analyses of Attack Graphs
攻击图的两种形式化分析 %A CHEN Feng %A ZHANG Yi %A SU Jin-Shu %A HAN Wen-Bao %A
陈锋 %A 张怡 %A 苏金树 %A 韩文报 %J 软件学报 %D 2010 %I %X An attack graph is a model-based vulnerability analysis technology, which can automatically analyze the interrelation among vulnerabilities in the network and the potential threats resulting from the vulnerabilities. Since the state-based attack graphs can not be applied to the real large networks for the combinatorial explosion in the number of attack paths, the study is now shifted to attribute-based. Based on attribute-based attack graphs, this paper discusses the loop attack paths and the optimization security measures. For the former, an iterative algorithm is presented to find all the non-loop attack paths to the key attributes with their depth less than the given number n. For the latter, it is proved to be an NP-complete problem, and the greedy algorithm is proposed to solve the problem with polynomial time complexity. %K vulnerability %K attack graph %K valid attack path %K optimization security measures %K greedy algorithm
脆弱性 %K 攻击图 %K 有效攻击路径 %K 最优弥补集 %K 贪婪算法 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=7735F413D429542E610B3D6AC0D5EC59&aid=DEA657F4616BF7FA2B7B714B106F6B0E&yid=140ECF96957D60B2&vid=659D3B06EBF534A7&iid=E158A972A605785F&sid=D40528F59753C0F7&eid=51E4ADE955550A0C&journal_id=1000-9825&journal_name=软件学报&referenced_num=0&reference_num=14