当前位置:主页 > 管理论文 > 移动网络论文 >

面向复杂网络的攻击图研究

发布时间:2018-07-07 19:23

  本文选题:复杂网络 + 社团网络 ; 参考:《北京邮电大学》2014年硕士论文


【摘要】:随着人们对计算机网络、电力网络等典型复杂网络认识的加深,面向复杂网络的安全问题日益受到关注,尤其是近些年来不断发生的计算机网络蠕虫病毒传播、电力网络瘫痪、动车线路冲突等事件,使得复杂网络的安全问题成为了一个不容忽视的课题。尽管不同的复杂网络实例具备相似的传播动力学特性与拓扑结构特性,但是在讨论各复杂网络实例的攻击仍然具备各自的特点。因此如何找到一种普适性的复杂网络安全分析方法,自然成为了人们所聚焦的研究方向。 .攻击图技术是一种常见的攻击建模手段,它研究网络中各个主机的脆弱性,通过一定的规则把它们关联起来,然后分析发现能够作用于目标网络的攻击路径,最终采用图的方式进行展示。网络管理员可以通过分析对攻击图的结构和内容了解当前网络的安全状态,提出有针对性的安全措施,提高网络的安全性。面向复杂网络的攻击图能够有效的展示网络所处的安全状况,对网络管理员来说有重要的意义,为风险评估、安全加固等管理活动提供依据。然而传统的攻击图技术在应用于大规模网络环境时,常常会因为遍历节点冗余,出现效率低下等问题。 本文通过研究复杂网络的结构特征和攻击行为特征,挖掘复杂网络与攻击图生成之间的结合点,定义了若干有助于构建攻击图的复杂网络的相关概念,以此为基础建立了复杂网络环境模型,继而结合当前的攻击图研究,对面向复杂网络的攻击图模型进行了介绍,提出了一种适用于复杂网络的“拆分-建模-融合”的攻击图生成算法,文末在攻击图模型和攻击图生成算法的基础上设计并实现了一套攻击图生成系统,并通过实验对算法和系统的可行性进行了分析和验证。
[Abstract]:With the deepening of people's understanding of typical complex networks, such as computer networks and power networks, the security problems facing complex networks have been paid more and more attention, especially the spread of computer network worms and the paralysis of power networks in recent years. The collision of train line makes the security of complex network become a problem that can not be ignored. Although different complex network instances have similar characteristics of propagation dynamics and topological structure, the attacks of different complex network instances still have their own characteristics. Therefore, how to find a universal and complex network security analysis method has naturally become the focus of research. Attack graph is a common attack modeling method. It studies the vulnerability of each host in the network, correlates it with certain rules, and then finds out the attack path that can act on the target network. Finally, it is displayed in the way of drawing. By analyzing the structure and content of the attack graph, the network administrator can understand the security status of the current network, and propose targeted security measures to improve the security of the network. The attack graph for complex network can effectively display the security situation of the network, which is of great significance to the network administrator, and provides the basis for the management activities such as risk assessment, security reinforcement and so on. However, when the traditional attack graph technology is applied to large-scale network environment, it is often due to redundant traversing nodes and low efficiency. In this paper, by studying the structural characteristics and attack behavior characteristics of complex networks, we excavate the joint points between complex networks and attack graph generation, and define some related concepts of complex networks which are helpful to construct attack graphs. Based on this, the complex network environment model is established, and then the attack graph model oriented to complex network is introduced in combination with the current attack graph research. In this paper, an attack graph generation algorithm, which is suitable for complex networks, is proposed. Based on the attack graph model and attack graph generation algorithm, a set of attack graph generation system is designed and implemented. The feasibility of the algorithm and the system is analyzed and verified by experiments.
【学位授予单位】:北京邮电大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08

【参考文献】

相关期刊论文 前5条

1 毛捍东;陈锋;张维明;朱承;;网络组合攻击建模方法研究进展[J];计算机科学;2007年11期

2 陈锋;毛捍东;张维明;雷长海;;攻击图技术研究进展[J];计算机科学;2011年11期

3 赵豹;张怡;孟源;;基于攻击模式的反向搜索攻击图生成算法[J];计算机工程与科学;2011年07期

4 陈盼;吴晓锋;李怡;尹志伟;;局部信息条件下复杂网络的攻击策略[J];计算机应用研究;2010年12期

5 冯萍慧;连一峰;戴英侠;鲍旭华;;基于可靠性理论的分布式系统脆弱性模型[J];软件学报;2006年07期



本文编号:2106000

资料下载
论文发表

本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2106000.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户1e09a***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com