首页 | 本学科首页   官方微博 | 高级检索  
     检索      

网络攻击图的构造及应用
引用本文:王永刚,苗毅,杨阳,陈钟,胡建斌.网络攻击图的构造及应用[J].中国通信学报,2009,6(4):13-16.
作者姓名:王永刚  苗毅  杨阳  陈钟  胡建斌
作者单位:[1]北京大学信息科学技术学院计算机系,100871; [2]机械工业研究院,100055
摘    要:With the development of computer networks, the attacks with respect to them are increasing explosively. It is a very important problem for security testers to test the security situation of a specific network (i.e., to use a method to model all the possible attacks within the environment). Of all the modeling methods, the Network Attack Graph is widely used because of its visual intuition. Under this circumstance, this paper firstly introduces the construction methods of the Network Attack Graph, then describes its application in the network security, and lastly previews some research directions of the Network Attack Graph.

关 键 词:计算机网络  网络通信  电子邮件  网络浏览器
收稿时间:2011-07-15;

The Construction and Application of Network Attack Graph
Wang Yonggang,Miao Yi,Yang Yang,Chen Zhong,Hu Jianbin.The Construction and Application of Network Attack Graph[J].China communications magazine,2009,6(4):13-16.
Authors:Wang Yonggang  Miao Yi  Yang Yang  Chen Zhong  Hu Jianbin
Institution:1Department of Computer Science and Technology, Peking University, Beijing 100871, China 2Research Institute of Machinery Economic and Management, Beijing 100055, China
Abstract:With the development of computer networks, the attacks with respect to them are increasing explosively. It is a very important problem for security testers to test the security situation of a specific network (i.e., to use a method to model all the possible attacks within the environment). Of all the modeling methods, the Network Attack Graph is widely used because of its visual intuition. Under this circumstance, this paper firstly introduces the construction methods of the Network Attack Graph, then describes its application in the network security, and lastly previews some research directions of the Network Attack Graph.
Keywords:network attack graph  network attack  penetration test
本文献已被 维普 等数据库收录!
点击此处可从《中国通信学报》浏览原始摘要信息
点击此处可从《中国通信学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号