攻击文法与攻击图模型的对比

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

攻击文法与攻击图模型的对比

作者:张殷乾, 王轶骏, 薛质, ZHANG Yinqian, WANG Yijun, XUE Zhi

作者单位:上海交通大学,信息安全工程学院,上海,200240

刊名:

辽宁工程技术大学学报(自然科学版)

英文刊名:JOURNAL OF LIAONING TECHNICAL UNIVERSITY(NATURAL SCIENCE)

年,卷(期):2008,27(6)

1.Phillips C;Swiler L A Graph-Based System for Network-Vulnerability Analysis 1998

2.Yinqian Zhang;Xun Fan;Yijun Wang Attack Grammar:A New Approach to Modeling and Analyzing Network Attack Sequences 2008

3.Ingols K;Lippmann R;piwowarski K Practical Attack Graph Generation for Network Defense 2006

4.Ou X;Govindavajhala S Appel A MulVAL:A Logic-Based Network Security Analyzer 2005

5.Xinming Ou;Wayne F,Boyer A Scalable Approach to Attack Graph Generation 2006

6.Sheyner O Automated Generation And Analysis of Attack Graphs" 2002

7.Ritchey R.W;Ammannm P Using Model Checking to Analyze Network Vulnerabilities 2000

8.Lippmann R P Validating And Restoring Defense in Depth Using Attack Graphs 2006

9.Jajodia S;Noel S;O'Berry B Topological Analysis of Network Attack Vulnerability,Managing Cyber Threats:Issues,Approaches and Challenges 2003

10.Swiler L;Phillips C;Ellis D Computer-Attack Graph Generation Tool 2001

本文链接:/Periodical_lngcjsdxxb200806029.aspx

相关文档
最新文档