|
计算机系统应用 2012
Right-Variation Rule Based Network Vulnerability Analysis
|
Abstract:
Network vulnerability can lead to fight-variation. From the view of how an attacker uses the vulnerabilities to achieve the unauthorized right of the destination entity, this paper models the vulnerabilities which lead to fight-variation and introduces the concept of take rule and vulnerability fight-variation rule. Based on the constructed right-variation model and the rules, the right-variation road closure can be achieved by using the vulnerability right-vafiation algorithm. A vulnerable network is modeled as the study case and it shows the effectiveness of the approach.