全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

网络攻击者行为特征及规划算法

Keywords: 攻击者,行为特征,行为规划

Full-Text   Cite this paper   Add to My Lib

Abstract:

为提高信息安全系统测试效率,在研究攻击者个体属性基础上,分析了攻击者面向任务的行为聚合规律,采用聚合算子、移动算子、分裂算子对其进行分析和描述,提出攻击者行为规划算法,给出攻击者行为的特征、规划和动态演变过程,通过算法示例演示证明了其可行性.

References

[1]  RAO Anand S.AgentSpeak(L):BDI agents speak out in a logical[DB/OL].[2007-22-20].http:∥www.cs.mu.oz.au/682/agentspeak.pdf.
[2]  TAMBE Milind,JOHNSON W L,JONES Randolph M,et al.Intelligent agents for interactive simulation environments[J].AI Magazine(AIM),1995,16(1):15-39.
[3]  RAY Helayne T,VEMURI Raghunath,KANTUBHUKTA Hariprasad R.Toward an automated attack model for red teams[J].IEEE Security and Privacy,2005,3(4):18-25.
[4]  郭春霞,刘增良,陶源,等.虚拟网络攻防分析模型研究[J].计算机工程与应用,2008,44(25):100-203.GUO Chun-xia,LIU Zeng-liang,TAO Yuan,et al.Virtual internet offensive and defensive analysis model[J].ComputerEngineering and Applications,2008,44(25):100-203.(in Chinese)
[5]  郭春霞,苗青.僵尸网络传播与控制机制研究[J].北京工业大学学报,2008,34(增刊):40-45.GUO Chun-xia,MIAO Qing.Research and progress of zombie network[J].Journal of Beijing University of Technology,2008,34(Supp):40-45.(in Chinese)
[6]  LARS B.Comparative study of quantitative models for hardware[J].Quality and Reliability Engineering International,2007,9(6):501-518.
[7]  TENG X L.Reliability modeling of hardware and software interactions,and its applications[J].IEEE Trans on Rel,2006,55(4):571-577.
[8]  KRAEMER S,CARAYON P,RUTH D,et al.Red team performance for improved computer security[DB/OL].[2009-03-23].http:∥cipi.engr.wisc.edu/system/files/neworleans.pdf.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133