全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

应用不完整攻击图分析的风险评估模型

DOI: 10.13190/jbupt.201003.57.wuh, PP. 57-61

Keywords: 攻击图,攻击路径,不完整攻击图分析,风险评估,风险管理

Full-Text   Cite this paper   Add to My Lib

Abstract:

References

[1]  Wang Lingyu, Singhal A, Jajodia S. Measuring the overall security of network configurations using attack graphs//Data and Applications Security 2007. Heidelberg: Springer, 2007: 98-112.
[2]  Ammann P, Wijesekera D, Kaushik S. Scalable, graph-based network vulnerability analysis//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington D C: ACM Press, 2002: 217-224.
[3]  张永铮, 方滨兴, 迟悦, 等. 网络风险评估中网络节点关联性的研究[J]. 计算机学报, 2007, 30(2): 234-240. Zhang Yongzheng, Fang Binxing, Chi Yue, et al. Research on network node correlation in network risk assessment[J]. Chinese Journal of Computers, 2007, 30(2): 234-240.
[4]  Chen Feng, Su Jinshu. A flexible approach to measuring network security using attack graphs//2008 International Symposium on Electronic Commerce and Security. Guangzhou: IEEE Computer Society, 2008: 426-431.
[5]  刘芳. 信息系统安全评估理论及其关键技术研究. 长沙: 国防科学技术大学, 2005.
[6]  邓新颖, 杨庚, 姚放吾, 等. 基于多阶段网络攻击的网络风险评估方法研究[J]. 计算机工程与应用, 2006, 42(18): 133-135, 203. Deng Xinying, Yang Geng, Yao Fangwu, et al. A network risk assessment method based on multi-stage network attack[J]. Computer Engineering and Applications, 2006, 42(18):133-135, 203.
[7]  刘晶, 伏飞, 戴江山, 等. 一种基于动态建链推理的网络攻击过程分析方法[J]. 电子科技大学学报, 2006, 35(5): 819-822. Liu Jing, Fu Fei, Dai Jiangshan, et al. A method of the network attack process analysis based on dynamic linking inference[J]. Journal of University of Electronic Science and Technology of China, 2006, 35(5): 819-822.
[8]  Noel S, Robertson E, Jajodia S. Correlating intrusion events and building attack scenarios through attack graph distances//Proceedings of the 20th Annual Computer Security Applications Conference. : IEEE Computer Society, 2004: 350-359.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133