期刊文献+

一种权限提升图的生成算法 被引量:1

A Generation Algorithm of Privilege Escalation Graph
原文传递
导出
摘要 随着IT业的迅速发展,网络安全也越来越受到重视。一种可适应不同网络、不同初始主机权限的网络权限图的生成算法可以发现已有的网络安全漏洞,帮助网络管理人员提高网络的安全性。这种算法以主机间的连接为分析基础,根据网络状态及各主机的初始权限,得出权限提升路径,从而分析此网络的安全性,同时对网络变化和主机权限调整具有良好的适应性。 With the high-speed development of IT industry in these years, network security attracts much attention from people. A generation algorithm of privilege escalation graph adaptable to different networks or different initial privileges of hosts could find the existed network security loophole. This algorithm, based on connection of the host and in accordance with the network status and the initial privileges of the hosts, obtains the privilege escalation graph and thus analyzes the network security. The algorithm is of good adaptability to network variation and host privilege adjustments.
作者 李婧 张保稳
出处 《信息安全与通信保密》 2011年第12期92-94,共3页 Information Security and Communications Privacy
关键词 权限图 网络安全评估 权限提升 privilege graph network security assessment privilege escalation
  • 相关文献

参考文献6

二级参考文献48

  • 1刘勃,周荷琴.基于贝叶斯网络的网络安全评估方法研究[J].计算机工程,2004,30(22):111-113. 被引量:15
  • 2王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:57
  • 3Man Dapeng,Zhang Bing,Yang Wu,et al.A method for global attack graph generation[C]//Networking,Sensing and Control.Washington: IEEE Computer Society,2008: 236-241.
  • 4Liu Yu,Man Hong.Network vulnerability assessment using Bayesian networks[C]//Proceedings of SPIEVolume 5812,Data Mining,Intrusion Detection,Information Assurance,and Data Networks Security.Bellingham WA: SPIE,2005: 61-71.
  • 5Igor Kotenko,Mikhail Stepashkin.Attack graph based evaluation of network security[C]//Lecture Notes in Computer Science.Berlin: SPRINGERVERLAG,2006:216227.
  • 6ZHANG Baowen,Zhu Willam,Xue Zhi.Mining privilege escalation paths for network vulnerability analysis[C]//Joint of International Conference on Natural Computation and International Conference on Fuzzy Systems and Knowledge Discovery.Washington: IEEE Computer Society,2007: 56-60.
  • 7Mell P,Scarfone K,Romanosky S.A complete guide to the common vulnerability scoring system version 2.0[C/OL].Forum of Incident Response and Security Teams.USA:IEEE,2007.http://www.first.org/cvss/cvssguide.html.
  • 8ZHANG Baowen, ZHU William, XUE Zhi. Mining Privilege Escalation Paths for Network Vulnerability Analysis[J]. FSKD, 2007(04): 56-60.
  • 9MITRE. CVE Database[DB/OL]. (2009-10-16)[2010-05-07]. http : //cve.mitre.org/.
  • 10Ortalo R, Deswartc Y, Kaaiche M. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security [R]. LAAS Report 96369, 1997-01

共引文献87

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部