基于OODA的网络对抗试验方法研究
[Abstract]:With the development of the Internet, it has gradually changed our life and penetrated into every corner of human society, especially in the era of mobile Internet, which has made the Internet experiencing a rapid development. The Internet is not only related to personal life, but also a strategic resource at home level. This topic has made some exploration on network attack and defense confrontation, and proposed a network confrontation model based on OODA from the angle of attacker - OODA-Net AD model.OODA-Net AD model with four sub modules: communication data acquisition module, protocol feature analysis module, attack strategy selection module and attack execution module, The second and third modules of the four modules are the focus of the study. Finally, the OODA-Net AD model is simulated and tested. The function of the second modules, the protocol feature analysis module, is to analyze the captured data packets and extract some features of the protocol. In the model, a protocol based on data flow analysis is used. The feature recognition technology first uses n-gram generation technology to convert every communication message in the original network packet into n-gram sequence, and then uses the keyword recognition technology based on LDA model to extract the keyword set of the protocol, and uses the Gibbs sampling method when the LDA model is solved; because of the captured data packets. There may be two packets belonging to different protocols, but they have approximate keywords. In this case, a hierarchical clustering algorithm is used to cluster the packets, and the Information Bottleneck method is used as an indicator to measure the clustering effect; and the sequence of frequent byte sequences is used in this paper. The method of alignment is a heuristic multiple sequence contrast algorithm. The third module, the attack strategy selection module, selects a strategy to bring the maximum benefit to the attacker from many attacks. In this case, a game theory based optimal attack strategy selection scheme is used. The cost and benefit of both the attack and defense are quantified. After completing the quantization work, the attack strategy selection model is established. The model is a complete information non cooperative nonzero sum game model, and then solves the Nash equilibrium state of the model. The advantage of the attack strategy selection model is very simple and intuitive and the solution algorithm of the model is very mature.
【学位授予单位】:哈尔滨工业大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP393.08
【参考文献】
相关期刊论文 前9条
1 曾键;赵辉;;一种基于N-Gram的计算机病毒特征码自动提取方法[J];计算机安全;2013年10期
2 戴理;舒辉;黄荷洁;;基于数据流分析的网络协议逆向解析技术[J];计算机应用;2013年05期
3 顾巧云;孙玉龙;高丰;;基于博弈论的网络攻防对抗模型及应用研究[J];信息网络安全;2013年01期
4 宁向延;张顺颐;;网络安全现状与技术发展[J];南京邮电大学学报(自然科学版);2012年05期
5 赵博夫;殷肖川;;基于Petri网的网络攻击流模型研究[J];计算机工程;2011年04期
6 宋阿妮;王明哲;郭法滨;倪枫;;着色Petri网的结构展开方法[J];系统工程理论与实践;2011年02期
7 石晶;李万龙;;基于LDA模型的主题词抽取方法[J];计算机工程;2010年19期
8 陈晓东;;混合战略纳什均衡及应用[J];中国市场;2008年14期
9 卢继军,黄刘生,吴树峰;基于攻击树的网络攻击建模方法[J];计算机工程与应用;2003年27期
相关会议论文 前2条
1 陈杰;黄炎焱;徐峰;;基于OODA-Petri网的电力系统应急流程建模与仿真[A];第三届中国指挥控制大会论文集(下册)[C];2015年
2 华立;赵纯均;;博弈论在经济系统分析中的应用[A];Systems Engineering, Systems Science and Complexity Research--Proceeding of 11th Annual Conference of Systems Engineering Society of China[C];2000年
相关博士学位论文 前3条
1 闫峰;基于攻击图的网络安全风险评估技术研究[D];吉林大学;2014年
2 刘积芬;网络入侵检测关键技术研究[D];东华大学;2013年
3 姜伟;基于攻防博弈模型的主动防御关键技术研究[D];哈尔滨工业大学;2010年
相关硕士学位论文 前6条
1 章倩;网络安全态势量化评估模型研究[D];合肥工业大学;2014年
2 韩煜;基于OODA的突发事件应急响应建模研究[D];南京理工大学;2014年
3 郑伟;基于防火墙的网络安全技术的研究[D];吉林大学;2012年
4 蔡建强;基于博弈模型的网络脆弱性评估的研究[D];华北电力大学;2011年
5 申红婷;纳什均衡计算的算法研究[D];贵州大学;2009年
6 陈伟;生物信息学中的序列相似性比对算法[D];中国海洋大学;2006年
,本文编号:2133571
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2133571.html