...
首页> 外文期刊>Scientific programming >Research on Multi-Target Network Security Assessment with Attack Graph Expert System Model
【24h】

Research on Multi-Target Network Security Assessment with Attack Graph Expert System Model

机译:攻击图专家系统模型的多目标网络安全评估研究

获取原文
           

摘要

With the rapid development of the Internet, network attacks often occur, and network security is widely concerned. Searching for practical security risk assessment methods is a research hotspot in the field of network security. Network attack graph model is an active detection technology for the attack path. From the perspective of the attacker, it simulated the whole network attack scenario and then presented the dependency among the vulnerabilities in the target network in the way of directed graph. It is an effective tool for analyzing network vulnerability. This paper describes in detail the common methods and tools of network security assessment and analyzes the construction of theoretical model of attack graph, the optimization technology of attack graph, and the research status of qualitative and quantitative analysis technology of attack graph in network security assessment. The attack graph generated in the face of large-scale network is too complex to find the key vulnerability nodes accurately and quickly. Optimizing the attack graph and solving the key attack set can help the security manager better understand the security state of the nodes in the network system, so as to strengthen the security defense ability and guarantee the security of the network system. For all kinds of loop phenomena of directed attribute attack graph, the general method of eliminating loop is given to get an acyclic attack graph. On the basis of acyclic attack graph, an optimization algorithm based on path complexity is proposed, which takes atomic attack distance and atomic weight into consideration, and on the basis of simplified attack graph, minimum-cost security reinforcement is carried out for the network environment. Based on the ant colony algorithm, the adaptive updating principle of changing pheromone and the local searching strategy of the adaptive genetic algorithm are proposed to improve the ant colony algorithm. The experimental results show that compared with the ant colony algorithm, the improved ant colony algorithm can speed up the process of solving the optimal solution. When the number of attack paths is large, the advantages of the improved ant colony algorithm in solving accuracy and late search speed are more obvious, and it is more suitable for large-scale networks.
机译:随着互联网的快速发展,经常发生的网络攻击,网络安全得到广泛关注。寻找实用安全风险评估方法是网络安全领域的研究热点。网络攻击图模型是攻击路径的主动检测技术。从攻击者的角度来看,它模拟了整个网络攻击方案,然后呈现了目标网络中的漏洞的依赖性。它是分析网络漏洞的有效工具。本文详细介绍了网络安全评估的共同方法和工具,分析了攻击图的理论模型,攻击图优化技术的构建以及网络安全评估中攻击图定性和定量分析技术的研究现状。在大规模网络面前生成的攻击图太复杂,无法准确且快速地找到关键漏洞节点。优化攻击图并解决密钥攻击集可以帮助安全管理器更好地了解网络系统中节点的安全状态,从而加强安全防御能力并保证网络系统的安全性。对于定向属性攻击图的各种环路现象,给出了消除循环的一般方法来获得无循环攻击图。在非循环攻击图的基础上,提出了一种基于路径复杂度的优化算法,其考虑原子攻击距离和原子重量,并且在简化的攻击图的基础上,对网络环境进行了最小成本的安全强化。基于蚁群算法,提出了改变信息素改变的自适应更新原理和自适应遗传算法的局部搜索策略,提高蚁群算法。实验结果表明,与蚁群算法相比,改进的蚁群算法可以加快解决最佳解决方案的过程。当攻击路径的数量很大时,改进的蚁群算法在求解精度和晚期搜索速度方面的优点更为明显,更适合大型网络。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号