全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

一种高效的攻击树串行建模方法

Keywords: 攻击树,串行建模,权重,最优路径

Full-Text   Cite this paper   Add to My Lib

Abstract:

为克服传统并行结构攻击树效率低、实用性差等问题,通过引入攻击序列,提出一种具有普适性的串行攻击树模型及其构建方法,并对每个叶子节点定义了其权重,从而对攻击单元效能进行量化分析;再利用Dijkstra算法计算攻击树模型中的最优路径,给出最佳攻击策略.通过对具有20个叶子节点的攻击树模型进行建模和分析,结果表明,新模型比传统并行模型具有更大的收益,攻击复杂度比传统模型降低65%.

References

[1]  Moore A P, Ellison R J, Linger R C. Attack modeling for information survivability. Pittsburgh: Carnegie Melon University, 2001.
[2]  Ray I, Poolsappasit N. Using attack trees to identify malicious attacks from authorized insiders[C]//Proceedings of 10th European Symp. Research in Computer Security (ESORICS \'05). Milan, Italy: Springer Berlin Heidelberg, 2005:231-246.
[3]  Buldas A, Laud P, Priisalu J, et al. Rational choice of security measures via multi-parameter attack trees[C]//Proceedings of 1st International Workshop on Critical Information Infrastructures Security.[S.l.]: Springer, 2006, 4347: 235-248.
[4]  Jürgenson A, Willemson J. Processing multi-parameter attack trees with estimated parameter values[C]//Proceedings of IWSEC.[S.l.]:Springer, 2007:308-319.
[5]  Jürgenson A, Willemson J. Computing exact outcomes of multi-parameter attack trees[C]//Proceedings of OTM.[S.l.]:Springer, 2008:1036-1051.
[6]  Lin Jincherng, Chen Janmin, Chen Chouchuan, et al. A game theoretic approach to decision and analysis in strategies of attack and defense[C]//Proceedings of Third IEEE International Conference on Secure Software Integration and Reliability Improvement.[S.l.]: IEEE, 2009:75-81.
[7]  Lü Wenping, Li Weimin. Space based information system security risk evaluation based on improved attack trees[C]//Proceedings of Third International Conference on Multimedia Information Networking and Security.[S.l.]: IEEE,2011: 480-483.
[8]  Poolsappasit Nayot, Dewri Rinku, Ray Indrajit. Dynamic security risk management using Bayesian attack graphs[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(1):61-74.
[9]  Weiss J D. A system security engineering process[C]//Proceedings of the 14th National Computer Security Conference. Washington D.C., USA: National Institute of Standards and Technology, National Computer Security Center, 1991:572-581.
[10]  Schneier Bruce. Attack trees: modeling security threats[J]. Dr. Dobb\'s Journal, 1999,24(12):21-29.
[11]  Edge K S. A framework for analyzing and mitigating the vulnerabilities of complex systems via attack and protection trees[D]. Ohio: Air Force Institute of Technology, 2007.
[12]  Espedahlen J H. Attack trees describing security in distributed internet-enabled metrology[D]. Gj?ik, Norway: Department of Computer Science and Media Technology, Gj?ik University College, 2007.
[13]  Convery S, Cook D, Franz M. An attack tree for the border gateway protocol[EB/OL].[2004-02-26]. http://www.ietf.org/proceedings/04aug/I-D/draft-ietf-rpsec-bgpattack-00.txt.
[14]  Ten C W,Liu C C, Govindarasu M. Vulnerability assessment of cybersecurity for SCADA systems using attack trees[C]//Proceedings of IEEE Power Engineering Society General Meeting.[S.l.]: IEEE, 2007:2527-2534.
[15]  Saini V, Duan Q, Paruchuri V. Threat modeling using attack trees[J]. Comput Small Coll, 2008,23(4):124-131.
[16]  Standardization Technical Committee of the National Information Security. GB-T20984-2007 information security technology-risk assessment specification for information security[S]. Beijing: Inspection and Quarantine of the People\'s Republic of China, 2007.
[17]  Ellis Horowitz. Fundamentals of data structures in C++[M]. Li Jianzhong, transl. Beijing: China Machine Press, 2007:184-187.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133