计算机应用 ›› 2011, Vol. 31 ›› Issue (08): 2146-2151.DOI: 10.3724/SP.J.1087.2011.02146

• 信息安全 • 上一篇    下一篇

基于扩展时间对象Petri网的粗糙网络攻击模型

黄光球,王纯子,张斌   

  1. 西安建筑科技大学 管理学院,西安710055
  • 收稿日期:2011-02-17 修回日期:2011-04-25 发布日期:2011-08-01 出版日期:2011-08-01
  • 通讯作者: 黄光球
  • 作者简介:黄光球(1964-),男,湖南桃源人,教授,博士,主要研究方向:网络安全;王纯子(1983-),女,陕西西安人,博士,主要研究方向:网络安全;张斌(1984-),男,陕西渭南人,工程师,硕士,主要研究方向:网络安全、软件测试。
  • 基金资助:

    陕西省重点学科建设专项资金资助项目(zdxk2010)

Rough attack model based on object Petri net of expanded time

Guang-qiu HUANG,Chun-zi WANG,Bin ZHANG   

  1. School of Management, Xi'an University of Architecture and Technology, Xi'an Shaanxi 710055, China
  • Received:2011-02-17 Revised:2011-04-25 Online:2011-08-01 Published:2011-08-01
  • Contact: Guang-qiu HUANG

摘要: 为了解决复杂网络中相似攻击手段和相似节点对象在攻击模型中造成冗余的问题,提出一种基于脆弱关联模型的粗糙网络攻击建模方法。在攻击变迁域和节点对象域上定义属性集,将相似的攻击方式和网络节点分类,形成论域Petri网上的类空间。通过定义路径相似度,利用蚁群算法找出所有可达攻击目标的特征路径,并在这些特征路径中找出给目标节点带来最大威胁的攻击路径。实验证明,该方法能够快速地定位实时监控信息中涉及的节点对象和攻击方式,在各种特征攻击路径中准确找到其所在位置。

关键词: 网络安全, 攻击模型, 粗糙集, Petri网

Abstract: To solve the redundancy problem caused by similar attack methods and similar node objects in an attack model of complex network, a rough network attack model based on the vulnerability relation model was put forward. The attribute set was defined on the node domain and the transition domain in a Petri net, similar attack methods and similar node objects were classified to form the class space of the domain Petri nets. By defining similar degree of path, all characteristic attack paths which could arrive at an attack goal could be searched out by the ant algorithm, and the maximal threat path, which could access the goal node, could be found out from all these characteristic attack paths. The experimental results show that the proposed model can quickly locate the node objects and the related attack methods from on-time monitoring information and find accurately their positions from all these characteristic attack paths.

Key words: network security, attack model, rough set, Petri net

中图分类号: