基于OODA的網(wǎng)絡(luò)對抗試驗方法研究
[Abstract]:With the development of the Internet, it has gradually changed our life and penetrated into every corner of human society, especially in the era of mobile Internet, which has made the Internet experiencing a rapid development. The Internet is not only related to personal life, but also a strategic resource at home level. This topic has made some exploration on network attack and defense confrontation, and proposed a network confrontation model based on OODA from the angle of attacker - OODA-Net AD model.OODA-Net AD model with four sub modules: communication data acquisition module, protocol feature analysis module, attack strategy selection module and attack execution module, The second and third modules of the four modules are the focus of the study. Finally, the OODA-Net AD model is simulated and tested. The function of the second modules, the protocol feature analysis module, is to analyze the captured data packets and extract some features of the protocol. In the model, a protocol based on data flow analysis is used. The feature recognition technology first uses n-gram generation technology to convert every communication message in the original network packet into n-gram sequence, and then uses the keyword recognition technology based on LDA model to extract the keyword set of the protocol, and uses the Gibbs sampling method when the LDA model is solved; because of the captured data packets. There may be two packets belonging to different protocols, but they have approximate keywords. In this case, a hierarchical clustering algorithm is used to cluster the packets, and the Information Bottleneck method is used as an indicator to measure the clustering effect; and the sequence of frequent byte sequences is used in this paper. The method of alignment is a heuristic multiple sequence contrast algorithm. The third module, the attack strategy selection module, selects a strategy to bring the maximum benefit to the attacker from many attacks. In this case, a game theory based optimal attack strategy selection scheme is used. The cost and benefit of both the attack and defense are quantified. After completing the quantization work, the attack strategy selection model is established. The model is a complete information non cooperative nonzero sum game model, and then solves the Nash equilibrium state of the model. The advantage of the attack strategy selection model is very simple and intuitive and the solution algorithm of the model is very mature.
【學位授予單位】:哈爾濱工業(yè)大學
【學位級別】:碩士
【學位授予年份】:2017
【分類號】:TP393.08
【參考文獻】
相關(guān)期刊論文 前9條
1 曾鍵;趙輝;;一種基于N-Gram的計算機病毒特征碼自動提取方法[J];計算機安全;2013年10期
2 戴理;舒輝;黃荷潔;;基于數(shù)據(jù)流分析的網(wǎng)絡(luò)協(xié)議逆向解析技術(shù)[J];計算機應(yīng)用;2013年05期
3 顧巧云;孫玉龍;高豐;;基于博弈論的網(wǎng)絡(luò)攻防對抗模型及應(yīng)用研究[J];信息網(wǎng)絡(luò)安全;2013年01期
4 寧向延;張順頤;;網(wǎng)絡(luò)安全現(xiàn)狀與技術(shù)發(fā)展[J];南京郵電大學學報(自然科學版);2012年05期
5 趙博夫;殷肖川;;基于Petri網(wǎng)的網(wǎng)絡(luò)攻擊流模型研究[J];計算機工程;2011年04期
6 宋阿妮;王明哲;郭法濱;倪楓;;著色Petri網(wǎng)的結(jié)構(gòu)展開方法[J];系統(tǒng)工程理論與實踐;2011年02期
7 石晶;李萬龍;;基于LDA模型的主題詞抽取方法[J];計算機工程;2010年19期
8 陳曉東;;混合戰(zhàn)略納什均衡及應(yīng)用[J];中國市場;2008年14期
9 盧繼軍,黃劉生,吳樹峰;基于攻擊樹的網(wǎng)絡(luò)攻擊建模方法[J];計算機工程與應(yīng)用;2003年27期
相關(guān)會議論文 前2條
1 陳杰;黃炎焱;徐峰;;基于OODA-Petri網(wǎng)的電力系統(tǒng)應(yīng)急流程建模與仿真[A];第三屆中國指揮控制大會論文集(下冊)[C];2015年
2 華立;趙純均;;博弈論在經(jīng)濟系統(tǒng)分析中的應(yīng)用[A];Systems Engineering, Systems Science and Complexity Research--Proceeding of 11th Annual Conference of Systems Engineering Society of China[C];2000年
相關(guān)博士學位論文 前3條
1 閆峰;基于攻擊圖的網(wǎng)絡(luò)安全風險評估技術(shù)研究[D];吉林大學;2014年
2 劉積芬;網(wǎng)絡(luò)入侵檢測關(guān)鍵技術(shù)研究[D];東華大學;2013年
3 姜偉;基于攻防博弈模型的主動防御關(guān)鍵技術(shù)研究[D];哈爾濱工業(yè)大學;2010年
相關(guān)碩士學位論文 前6條
1 章倩;網(wǎng)絡(luò)安全態(tài)勢量化評估模型研究[D];合肥工業(yè)大學;2014年
2 韓煜;基于OODA的突發(fā)事件應(yīng)急響應(yīng)建模研究[D];南京理工大學;2014年
3 鄭偉;基于防火墻的網(wǎng)絡(luò)安全技術(shù)的研究[D];吉林大學;2012年
4 蔡建強;基于博弈模型的網(wǎng)絡(luò)脆弱性評估的研究[D];華北電力大學;2011年
5 申紅婷;納什均衡計算的算法研究[D];貴州大學;2009年
6 陳偉;生物信息學中的序列相似性比對算法[D];中國海洋大學;2006年
,本文編號:2133571
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2133571.html