面向復(fù)雜網(wǎng)絡(luò)的攻擊圖研究
發(fā)布時(shí)間:2018-07-07 19:23
本文選題:復(fù)雜網(wǎng)絡(luò) + 社團(tuán)網(wǎng)絡(luò); 參考:《北京郵電大學(xué)》2014年碩士論文
【摘要】:隨著人們對計(jì)算機(jī)網(wǎng)絡(luò)、電力網(wǎng)絡(luò)等典型復(fù)雜網(wǎng)絡(luò)認(rèn)識的加深,面向復(fù)雜網(wǎng)絡(luò)的安全問題日益受到關(guān)注,尤其是近些年來不斷發(fā)生的計(jì)算機(jī)網(wǎng)絡(luò)蠕蟲病毒傳播、電力網(wǎng)絡(luò)癱瘓、動(dòng)車線路沖突等事件,使得復(fù)雜網(wǎng)絡(luò)的安全問題成為了一個(gè)不容忽視的課題。盡管不同的復(fù)雜網(wǎng)絡(luò)實(shí)例具備相似的傳播動(dòng)力學(xué)特性與拓?fù)浣Y(jié)構(gòu)特性,但是在討論各復(fù)雜網(wǎng)絡(luò)實(shí)例的攻擊仍然具備各自的特點(diǎn)。因此如何找到一種普適性的復(fù)雜網(wǎng)絡(luò)安全分析方法,自然成為了人們所聚焦的研究方向。 .攻擊圖技術(shù)是一種常見的攻擊建模手段,它研究網(wǎng)絡(luò)中各個(gè)主機(jī)的脆弱性,通過一定的規(guī)則把它們關(guān)聯(lián)起來,然后分析發(fā)現(xiàn)能夠作用于目標(biāo)網(wǎng)絡(luò)的攻擊路徑,最終采用圖的方式進(jìn)行展示。網(wǎng)絡(luò)管理員可以通過分析對攻擊圖的結(jié)構(gòu)和內(nèi)容了解當(dāng)前網(wǎng)絡(luò)的安全狀態(tài),提出有針對性的安全措施,提高網(wǎng)絡(luò)的安全性。面向復(fù)雜網(wǎng)絡(luò)的攻擊圖能夠有效的展示網(wǎng)絡(luò)所處的安全狀況,對網(wǎng)絡(luò)管理員來說有重要的意義,為風(fēng)險(xiǎn)評估、安全加固等管理活動(dòng)提供依據(jù)。然而傳統(tǒng)的攻擊圖技術(shù)在應(yīng)用于大規(guī)模網(wǎng)絡(luò)環(huán)境時(shí),常常會因?yàn)楸闅v節(jié)點(diǎn)冗余,出現(xiàn)效率低下等問題。 本文通過研究復(fù)雜網(wǎng)絡(luò)的結(jié)構(gòu)特征和攻擊行為特征,挖掘復(fù)雜網(wǎng)絡(luò)與攻擊圖生成之間的結(jié)合點(diǎn),定義了若干有助于構(gòu)建攻擊圖的復(fù)雜網(wǎng)絡(luò)的相關(guān)概念,以此為基礎(chǔ)建立了復(fù)雜網(wǎng)絡(luò)環(huán)境模型,繼而結(jié)合當(dāng)前的攻擊圖研究,對面向復(fù)雜網(wǎng)絡(luò)的攻擊圖模型進(jìn)行了介紹,提出了一種適用于復(fù)雜網(wǎng)絡(luò)的“拆分-建模-融合”的攻擊圖生成算法,文末在攻擊圖模型和攻擊圖生成算法的基礎(chǔ)上設(shè)計(jì)并實(shí)現(xiàn)了一套攻擊圖生成系統(tǒng),并通過實(shí)驗(yàn)對算法和系統(tǒng)的可行性進(jìn)行了分析和驗(yàn)證。
[Abstract]:With the deepening of people's understanding of typical complex networks, such as computer networks and power networks, the security problems facing complex networks have been paid more and more attention, especially the spread of computer network worms and the paralysis of power networks in recent years. The collision of train line makes the security of complex network become a problem that can not be ignored. Although different complex network instances have similar characteristics of propagation dynamics and topological structure, the attacks of different complex network instances still have their own characteristics. Therefore, how to find a universal and complex network security analysis method has naturally become the focus of research. Attack graph is a common attack modeling method. It studies the vulnerability of each host in the network, correlates it with certain rules, and then finds out the attack path that can act on the target network. Finally, it is displayed in the way of drawing. By analyzing the structure and content of the attack graph, the network administrator can understand the security status of the current network, and propose targeted security measures to improve the security of the network. The attack graph for complex network can effectively display the security situation of the network, which is of great significance to the network administrator, and provides the basis for the management activities such as risk assessment, security reinforcement and so on. However, when the traditional attack graph technology is applied to large-scale network environment, it is often due to redundant traversing nodes and low efficiency. In this paper, by studying the structural characteristics and attack behavior characteristics of complex networks, we excavate the joint points between complex networks and attack graph generation, and define some related concepts of complex networks which are helpful to construct attack graphs. Based on this, the complex network environment model is established, and then the attack graph model oriented to complex network is introduced in combination with the current attack graph research. In this paper, an attack graph generation algorithm, which is suitable for complex networks, is proposed. Based on the attack graph model and attack graph generation algorithm, a set of attack graph generation system is designed and implemented. The feasibility of the algorithm and the system is analyzed and verified by experiments.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前5條
1 毛捍東;陳鋒;張維明;朱承;;網(wǎng)絡(luò)組合攻擊建模方法研究進(jìn)展[J];計(jì)算機(jī)科學(xué);2007年11期
2 陳鋒;毛捍東;張維明;雷長海;;攻擊圖技術(shù)研究進(jìn)展[J];計(jì)算機(jī)科學(xué);2011年11期
3 趙豹;張怡;孟源;;基于攻擊模式的反向搜索攻擊圖生成算法[J];計(jì)算機(jī)工程與科學(xué);2011年07期
4 陳盼;吳曉鋒;李怡;尹志偉;;局部信息條件下復(fù)雜網(wǎng)絡(luò)的攻擊策略[J];計(jì)算機(jī)應(yīng)用研究;2010年12期
5 馮萍慧;連一峰;戴英俠;鮑旭華;;基于可靠性理論的分布式系統(tǒng)脆弱性模型[J];軟件學(xué)報(bào);2006年07期
,本文編號:2106000
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2106000.html
最近更新
教材專著