上海大学学报(自然科学版) ›› 2013, Vol. 19 ›› Issue (3): 271-279.doi: 10.3969/j.issn.1007-2861.2013.03.011

• 计算机工程与科学 • 上一篇    下一篇

基于主机攻击图的攻击识别

钱权, 朱伟, 赖岩岩, 张瑞   

  1. 1. 上海大学 计算机工程与科学学院, 上海 200072; 2. 中国科学院 信息安全国家重点实验室, 北京 100190
  • 收稿日期:2012-11-05 出版日期:2013-06-30 发布日期:2013-06-30
  • 通讯作者: 钱权(1972—), 男, 副教授, 博士, 研究方向为计算网络、网络安全和协议分析与验证. E-mail:qqian@shu.edu.cn
  • 基金资助:

    上海市重点学科建设资助项目(J50103)

Host-Based Attack Graph for Attack Recognition

QIAN Quan, ZHU Wei, LAI Yan-yan, ZHANG Rui   

  1. 1. School of Computer Engineering and Science, Shanghai University, Shanghai 200072, China; 2. State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing 100190, China
  • Received:2012-11-05 Online:2013-06-30 Published:2013-06-30

摘要: 研究了一种基于主机攻击图的网络攻击识别方法, 其核心是定义一种SAGML 语言, 并利用该语言中的状态、行为和关系来描述攻击. 详细讨论了攻击图的状态结构和行为链结构, 以及基于XML 语言的攻击图构建和解析过程. 此外, 为了提高攻击图的匹配效率, 研究了攻击图的索引建立和匹配过程. 最后, 结合SYNFlood 和Peacomm 攻击示例, 介绍了该方法的应用过程.

关键词: 攻击图, 攻击图匹配, 攻击图索引

Abstract: This paper establishes a system of network attack recognition based on attack graph by defining a SAGML language, which uses three elements: state, behavior and relationship to describe an attack. State and behavior chain structure of the attack graph, and the construction and analysis of attack graph based on XML are discussed in detail. To improve efficiency of attack graph retrieval, the attack graph indexing and matching strategy are studied. Two typical attacks, SYNFlood and Peacomm, are used to show applications of the proposed method.

Key words: attack graph, attack graph indexing, attack graph matching

中图分类号: