攻击文法与攻击图模型的对比
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
攻击文法与攻击图模型的对比
作者:张殷乾, 王轶骏, 薛质, ZHANG Yinqian, WANG Yijun, XUE Zhi
作者单位:上海交通大学,信息安全工程学院,上海,200240
刊名:
辽宁工程技术大学学报(自然科学版)
英文刊名:JOURNAL OF LIAONING TECHNICAL UNIVERSITY(NATURAL SCIENCE)
年,卷(期):2008,27(6)
1.Phillips C;Swiler L A Graph-Based System for Network-Vulnerability Analysis 1998
2.Yinqian Zhang;Xun Fan;Yijun Wang Attack Grammar:A New Approach to Modeling and Analyzing Network Attack Sequences 2008
3.Ingols K;Lippmann R;piwowarski K Practical Attack Graph Generation for Network Defense 2006
4.Ou X;Govindavajhala S Appel A MulVAL:A Logic-Based Network Security Analyzer 2005
5.Xinming Ou;Wayne F,Boyer A Scalable Approach to Attack Graph Generation 2006
6.Sheyner O Automated Generation And Analysis of Attack Graphs" 2002
7.Ritchey R.W;Ammannm P Using Model Checking to Analyze Network Vulnerabilities 2000
8.Lippmann R P Validating And Restoring Defense in Depth Using Attack Graphs 2006
9.Jajodia S;Noel S;O'Berry B Topological Analysis of Network Attack Vulnerability,Managing Cyber Threats:Issues,Approaches and Challenges 2003
10.Swiler L;Phillips C;Ellis D Computer-Attack Graph Generation Tool 2001
本文链接:/Periodical_lngcjsdxxb200806029.aspx