首页> 外文学位 >Validating Petri Net Models of Cyberattacks
【24h】

Validating Petri Net Models of Cyberattacks

机译:验证网络攻击的Petri网模型

获取原文
获取原文并翻译 | 示例

摘要

As part of a team project modeling computer system vulnerabilities and cyberattacks, this research focused on Petri net models and validation methods for them. First, the chosen target, Metasploitable, was scanned for vulnerabilities, which were matched to Common Attack Pattern Enumeration and Classification (CAPEC) entries. For a preliminary validation, the models were compared with the entries. Then a dynamic validation was applied to two models of CAPEC entries and to one model of a known backdoor, Ingreslock. Three experimental cyberattacks were compared with their respective models, giving partial validation. The results of the comparison show that this dynamic method was only sufficient to validate a specific sequence of each attack. Formal analysis of Petri net properties proved to be more suited to verification of the model, rather than validation.
机译:作为对计算机系统漏洞和网络攻击进行建模的团队项目的一部分,本研究着重于Petri网络模型及其验证方法。首先,对选定的目标Metasploitable进行漏洞扫描,并与“常见攻击模式枚举和分类(CAPEC)”条目匹配。为了进行初步验证,将模型与条目进行了比较。然后,将动态验证应用于CAPEC条目的两个模型和已知后门Ingreslock的一个模型。将三个实验性网络攻击与它们各自的模型进行了比较,从而进行了部分验证。比较结果表明,这种动态方法仅足以验证每种攻击的特定顺序。事实证明,对Petri网属性的形式分析更适合于模型验证,而不是验证。

著录项

  • 作者

    Christensen, Nicholas M.;

  • 作者单位

    The University of Alabama in Huntsville.;

  • 授予单位 The University of Alabama in Huntsville.;
  • 学科 Computer science.
  • 学位 M.S.
  • 年度 2017
  • 页码 102 p.
  • 总页数 102
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 TS97-4;
  • 关键词

  • 入库时间 2022-08-17 11:54:27

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号