• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2010, Vol. 32 ›› Issue (6): 22-25.doi: 10.3969/j.issn.1007130X.2010.

• 论文 • 上一篇    下一篇

基于贪心策略的多目标攻击图生成方法

朱明1,殷建平1,程杰仁1,2,刘强1,林加润1   

  1. (1.国防科学技术大学计算机学院,湖南 长沙 410073;2.湘南学院,湖南 郴州 423000)
  • 收稿日期:2009-11-15 修回日期:2010-02-09 出版日期:2010-06-01 发布日期:2010-06-01
  • 通讯作者: 朱明 E-mail:sumoonudt@163.com
  • 作者简介:朱明(1985),男,内蒙古包头人,硕士生,研究方向为网络安全风险评估;殷建平,教授,博士生导师,研究方向为人工智能、网络安全和模式识别;程杰仁,博士生;刘强,硕士生;林加润,硕士生。
  • 基金资助:

    国家自然科学基金资助项目(60603062,60603015,60970034);湖南省教育厅资助科研项目(07C718);公安部应用创新计划(2007YYCXHNST072)

A Method of Generating the MultiTargets Attack Graphs Based on Greedy Policies

ZHU Ming1,YIN Jianping1,CHENG Jieren1,2,LIU Qiang1,LIN Jiarun1   

  1. (1.School of Computer Science,National University of Defense Technology,Changsha 410073;
    2.Xiangnan University,Chenzhou 423000,China)
  • Received:2009-11-15 Revised:2010-02-09 Online:2010-06-01 Published:2010-06-01

摘要:

为解决网络脆弱性分析中攻击图生成方法存在的状态组合爆炸问题,使生成的攻击图能用于网络中多个目标主机的脆弱性分析,本文提出了一种基于贪心策略的多目标攻击图生成方法。该方法引入节点关联关系,采用贪心策略精简漏洞集,从所有攻击路径中选取使攻击者以最大概率获取网络节点权限的攻击路径,生成由这些攻击路径所构成的攻击图。算法分析和实验结果表明,该方法的时间和空间复杂度都是网络节点数和节点关联关系数的多项式级别,较好地解决了状态组合爆炸的问题,生成的攻击图覆盖了攻击可达的所有节点,能够用于网络中多个目标主机的脆弱性分析。

关键词: 网络脆弱性分析, 节点关联关系, 多目标攻击图, 贪心策略

Abstract:

In order to avoid the combination of states occurred in the generation of attack graphs while analyzing network vulnerabilities and to make the attack graphs available for analyzing the multitargets’ vulnerabilities, a new method of generating attack graphs based on greedy policies is proposed. The method introduces the  network node correlations, uses greedy policies to reduce the amount of vulnerabilities, chooses the attack routes that allow attackers to gain network node priority with the greatest potential and generate the attack graphs with those attack routes. The algorithm analysis and the experimental results show that the cost of time and space of the method is the polynomial level of the network node number and the network node correlation number, which means it has solved the problem of the great combination of states effectively. The attack graph it generates covers all network nodes that attackers can access, so the method can be used to analyze the multitargets’ vulnerabilities.

Key words: network vulnerability analysis;network node correlation;multitargets attack graph;greedy policy

中图分类号: