Volume 33 Issue 12
Dec.  2007
Turn off MathJax
Article Contents
Tang Shujun, Li Xiaojian, Tu Shouzhong, et al. Description language oriented to attack tree model[J]. Journal of Beijing University of Aeronautics and Astronautics, 2007, 33(12): 1486-1490. (in Chinese)
Citation: Tang Shujun, Li Xiaojian, Tu Shouzhong, et al. Description language oriented to attack tree model[J]. Journal of Beijing University of Aeronautics and Astronautics, 2007, 33(12): 1486-1490. (in Chinese)

Description language oriented to attack tree model

  • Received Date: 21 Dec 2006
  • Publish Date: 31 Dec 2007
  • A main problem of recent researches on network security simulation is the lack of methods to model attack and uniform description. Hence computer network attack description language(CNADL) was presented, with attack tree adopted to model attacks and describe purpose, characteristic and process of attack. Attack tree was used to model attacks and then transformed to automata model. CNADL, which was attack tree model oriented and designed in context-free grammar, described the goal, means and process of different attacks in uniform format. The interpreter translated CNADL into corresponding orders and sent them to attack drilling system. Based on GTNetS simulator, the attack drilling system tested the validity of CNADL. The experimental results show that CNADL is able to describe attack characteristics efficiently, and simulate denial of service(DoS), worm password attack and IP spoof based on GTNetS.

     

  • loading
  • [1] Ye N, Hosmer C, Giordano J, et al. Critical information infrastructure protection through process modeling and model-based information fusion [J]. Proceedings of the Information Survivability Workshop, 1998 [2] 李肖坚. 一种计算机网络自组织的协同对抗模型[J].计算机研究与发展, 2005,42:618-628 Li Xiaojian. A self-organized model of coordinated computer network operation[J]. Journal of Computer Research and Development, 2005,42:618-628(in Chinese) [3] Schneier B. Attack trees[J]. Dr. Dobb-s Journal of Software Tools, 1999,12(24): 21-29 [4] Cohen F B. Simulating cyber attacks, defenses, and consequences[J]. Computers and Sevurity,1999,18(6):479-518 [5] Chi S D, Park J S, Jung K C, et al. Network security modeling and cyber attack simulation methodology Vijay Varadharajan. Australasian Conference on Information Security and Privacy(ACISP). London: Springer-Verlag ,2001: 320-333 [6] Park E K, Yun J B, In H P. Simulating cyber-intrusion using ordered UML model-based scenarios Lecture Notes in Artificial Intelligence(Subseries of Lectwe Notes in Computer Science). London: Springer, 2005 : 643-651 [7] Vigna G, Eckmann S T, Kemmerer R A. Attack languages[J]. Proceedings of the IEEE Information Survivability Workshop (ISW 2000), 2000:163-166 [8] Eckmann S T,Vigna G, Kemmerer R. STATL:An attack language for state-based intrusion detection[J]. Journal of Computer Security, 2002,10:71-104 [9] Cuppens F, Ortalo R. LAMBDA: A language to model a database for detection of attacks[J]. Recent Advances in Intrusion Detection (RAID 2000), 2000, 1907: 197-216 [10] Ce dric M, Ludovic M. ADele: An attack description language for knowledge-based intrusion detection Proc of the 16th Int-l Conf on Information Security. Dordrecht,Holland:Kluwer,2001:353-368 [11] Kotenko I, Man’kov E. Experiments with simulation of attacks against computer networks[J]. Computer Network Security, 2003, 2776:183–194 [12] Joint Chiefs of Staff. Joint Publication 3-13 . US: Department of Defense Dictionary of Military and Associated Terms, 2006
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(3064) PDF downloads(1547) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return