全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2008 

一种基于智能规划的信息安全风险过程建模方法

Keywords: 智能规划,风险过程,规划领域定义语言

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了评估网络信息系统的安全风险,提出了基于智能规划的信息安全风险过程建模方法:使用规划领域的定义语言描述信息安全的风险领域和风险问题,修改后的bifrost规划引擎调用相关算法构建系统所有的渗透路径,最后通过GraphvizToolkit接口绘制出规划渗透图表现系统安全风险过程.

References

[1]  陈光.信息系统信息安全风险管理方法研究[D].长沙:国防科技大学研究生院,2006.Chen Guang.Research on method of information system informarion security risk management[D].Changsha:Graduate School of National University of Defense Technology,2006.
[2]  Ou Xin-ming.A scalable approach to attack graph generation[A].Proceedings of the 13th ACM Conference on Computer and Communications Security[C].Alexandria Virginia,USA:ACM,2006.336-345.
[3]  O Sheyner.Scenarios Graphs and Attack Graphs[D].Pittsburgh,Pennsylvania,USA:Department of Computer Science,Carnegie Mellon University,2004.
[4]  L Swiler,C Philips,D EUis,et al.Computer-attack graph generation tool[A].DARPA Information Survivability Conference and Exposition Proceedings[C].Anaheim,CA,USA:IEEE,2002.307-321.
[5]  Wei Li.An Approach to Graph-Based Modeling of Network Exploitations[D].Mississippi State:Mississippi State University,2005.
[6]  Russell,Stuart,Peter Norvig.人工智能[M].北京:人民邮电出版社,2004.
[7]  R M Jensen,M M Veloso,R E Bryant.Guided symbolic universal planning[A].Proceedings of the 13th International Conference on Automated Planning and Scheduling[C].Trento,Italy:IEEE,2003.123-132.
[8]  毛撼东.基于逻辑渗透图模型的网络安全风险评估方法研究[D].长沙:国防科技大学研究生院,2008.Mao Han-dong.A novel assessment approach based on logical exploitation graph model for network security[D].Changsha:Graduate School of National University of Defense Technology,2008.
[9]  P Ammann,D Wijesek_era,S Kaushik.Scalable,graph-based network vulnerability analysis[A].Proceedings of the 9th ACM Conference on Computer and Communications Security[C].Washington DC,USA:ACM,2002.217-224.
[10]  Li Wei.An approach to model network exploitations using ex ploitation graph[J].SIMULATION,2006,82(8):523-541.
[11]  Lippmann R,K W Ingols.An Annotated Review of Past Papers on Attack Graphs[R].Project Report IA-1,Lexington,Massachusetts:Lincoln Laboratory of Massachusetts Institute of Technology,201)5.
[12]  宋泾舸,查建中,陆一平.智能规划研究综述——一个面向应用的视角[J].智能系统学报,2007,2(2):18-25.Song Jian-ge,Cha Jian-zhong,Lu Yi-ping.Survey on AI planning research-an application-oriented perspective[J].CAAI Transactiom on Intelligent Systems,2007,2(2):18-25.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133