留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一种面向攻击树建模的描述语言

唐淑君 李肖坚 屠守中 韦刚

唐淑君, 李肖坚, 屠守中, 等 . 一种面向攻击树建模的描述语言[J]. 北京航空航天大学学报, 2007, 33(12): 1486-1490.
引用本文: 唐淑君, 李肖坚, 屠守中, 等 . 一种面向攻击树建模的描述语言[J]. 北京航空航天大学学报, 2007, 33(12): 1486-1490.
Tang Shujun, Li Xiaojian, Tu Shouzhong, et al. Description language oriented to attack tree model[J]. Journal of Beijing University of Aeronautics and Astronautics, 2007, 33(12): 1486-1490. (in Chinese)
Citation: Tang Shujun, Li Xiaojian, Tu Shouzhong, et al. Description language oriented to attack tree model[J]. Journal of Beijing University of Aeronautics and Astronautics, 2007, 33(12): 1486-1490. (in Chinese)

一种面向攻击树建模的描述语言

基金项目: 航空科学基金资助项目(03F51060);北京教育委员会共建项目建设计划基金资助项目(SYS100060412);国防基础科研资助项目(2007A01Z407)
详细信息
    作者简介:

    唐淑君(1981-),女,广西桂林人,硕士生,Tangducky@hotmail.com.

  • 中图分类号: TP 393.08

Description language oriented to attack tree model

  • 摘要: 目前网络安全仿真研究中存在缺乏攻击建模方法以及统一描述的问题,因此在采用攻击树建立攻击模型,描述攻击企图、特征和步骤执行过程的基础上,提出一种攻击描述语言CNADL(Computer Network Attack Description Language).攻击树用于对攻击进行建模,并转化为自动机模型.CNADL采用上下文无关文法,用统一的形式描述攻击的目的、方法和步骤,由解释器生成相应操作的命令交付攻击演练系统执行.利用基于GTNetS仿真平台的攻击演练系统对CNADL进行实验验证.结果表明,该语言能有效地刻画攻击特征,结合仿真平台,实现了拒绝服务、蠕虫、口令窃取和IP欺骗4种攻击仿真.

     

  • [1] Ye N, Hosmer C, Giordano J, et al. Critical information infrastructure protection through process modeling and model-based information fusion [J]. Proceedings of the Information Survivability Workshop, 1998 [2] 李肖坚. 一种计算机网络自组织的协同对抗模型[J].计算机研究与发展, 2005,42:618-628 Li Xiaojian. A self-organized model of coordinated computer network operation[J]. Journal of Computer Research and Development, 2005,42:618-628(in Chinese) [3] Schneier B. Attack trees[J]. Dr. Dobb-s Journal of Software Tools, 1999,12(24): 21-29 [4] Cohen F B. Simulating cyber attacks, defenses, and consequences[J]. Computers and Sevurity,1999,18(6):479-518 [5] Chi S D, Park J S, Jung K C, et al. Network security modeling and cyber attack simulation methodology Vijay Varadharajan. Australasian Conference on Information Security and Privacy(ACISP). London: Springer-Verlag ,2001: 320-333 [6] Park E K, Yun J B, In H P. Simulating cyber-intrusion using ordered UML model-based scenarios Lecture Notes in Artificial Intelligence(Subseries of Lectwe Notes in Computer Science). London: Springer, 2005 : 643-651 [7] Vigna G, Eckmann S T, Kemmerer R A. Attack languages[J]. Proceedings of the IEEE Information Survivability Workshop (ISW 2000), 2000:163-166 [8] Eckmann S T,Vigna G, Kemmerer R. STATL:An attack language for state-based intrusion detection[J]. Journal of Computer Security, 2002,10:71-104 [9] Cuppens F, Ortalo R. LAMBDA: A language to model a database for detection of attacks[J]. Recent Advances in Intrusion Detection (RAID 2000), 2000, 1907: 197-216 [10] Ce dric M, Ludovic M. ADele: An attack description language for knowledge-based intrusion detection Proc of the 16th Int-l Conf on Information Security. Dordrecht,Holland:Kluwer,2001:353-368 [11] Kotenko I, Man’kov E. Experiments with simulation of attacks against computer networks[J]. Computer Network Security, 2003, 2776:183–194 [12] Joint Chiefs of Staff. Joint Publication 3-13 . US: Department of Defense Dictionary of Military and Associated Terms, 2006
  • 加载中
计量
  • 文章访问数:  3151
  • HTML全文浏览量:  134
  • PDF下载量:  1549
  • 被引次数: 0
出版历程
  • 收稿日期:  2006-12-21
  • 网络出版日期:  2007-12-31

目录

    /

    返回文章
    返回
    常见问答