基于贪婪启发式算法的网络攻击图生成方法

Yuan Feng, Ludan Wang, Jianwei Zhang, Zengyu Cai, Yong Gan
{"title":"基于贪婪启发式算法的网络攻击图生成方法","authors":"Yuan Feng, Ludan Wang, Jianwei Zhang, Zengyu Cai, Yong Gan","doi":"10.14257/ijhit.2017.10.6.03","DOIUrl":null,"url":null,"abstract":"mailfengy@163.com Abstract State explosion has become a serious problem of attack graph generation method, which results in a large-scale attack graph. Attackers always try to infiltrate into the internal network quickly, access to the more important host directly and get higher access right. The model of network attack graph generation is established based on these premises. The model expands network state node according to the evaluation function. If the valuation function value is smaller, it is the priority to expand. The evaluation value is calculated by the path length, attack difficulty, type of target host and authority obtained after the attack. Experimental results show that the network attack graph generation method based on greedy heuristic algorithm can do well in network attack graph generation, and it has a lower time complexity and good scalability. The research for this article has a great significance to improve the usefulness of network attack","PeriodicalId":170772,"journal":{"name":"International Journal of Hybrid Information Technology","volume":"141 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Generation Method of Network Attack Graph Based On Greedy Heuristic Algorithm\",\"authors\":\"Yuan Feng, Ludan Wang, Jianwei Zhang, Zengyu Cai, Yong Gan\",\"doi\":\"10.14257/ijhit.2017.10.6.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"mailfengy@163.com Abstract State explosion has become a serious problem of attack graph generation method, which results in a large-scale attack graph. Attackers always try to infiltrate into the internal network quickly, access to the more important host directly and get higher access right. The model of network attack graph generation is established based on these premises. The model expands network state node according to the evaluation function. If the valuation function value is smaller, it is the priority to expand. The evaluation value is calculated by the path length, attack difficulty, type of target host and authority obtained after the attack. Experimental results show that the network attack graph generation method based on greedy heuristic algorithm can do well in network attack graph generation, and it has a lower time complexity and good scalability. The research for this article has a great significance to improve the usefulness of network attack\",\"PeriodicalId\":170772,\"journal\":{\"name\":\"International Journal of Hybrid Information Technology\",\"volume\":\"141 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Hybrid Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/ijhit.2017.10.6.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Hybrid Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/ijhit.2017.10.6.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

mailfengy@163.com抽象状态爆炸已经成为攻击图生成方法中的一个重要问题,它可以生成大规模的攻击图。攻击者总是试图快速渗透到内部网络,直接访问更重要的主机,获得更高的访问权限。在此前提下,建立了网络攻击图生成模型。该模型根据评价函数展开网络状态节点。如果估值函数值较小,则优先扩展。评估值由攻击后获得的路径长度、攻击难度、目标主机类型和权限计算得出。实验结果表明,基于贪婪启发式算法的网络攻击图生成方法可以很好地完成网络攻击图的生成,并且具有较低的时间复杂度和良好的可扩展性。本文的研究对提高网络攻击的有效性具有重要意义
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Generation Method of Network Attack Graph Based On Greedy Heuristic Algorithm
mailfengy@163.com Abstract State explosion has become a serious problem of attack graph generation method, which results in a large-scale attack graph. Attackers always try to infiltrate into the internal network quickly, access to the more important host directly and get higher access right. The model of network attack graph generation is established based on these premises. The model expands network state node according to the evaluation function. If the valuation function value is smaller, it is the priority to expand. The evaluation value is calculated by the path length, attack difficulty, type of target host and authority obtained after the attack. Experimental results show that the network attack graph generation method based on greedy heuristic algorithm can do well in network attack graph generation, and it has a lower time complexity and good scalability. The research for this article has a great significance to improve the usefulness of network attack
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信