高级检索
    王硕, 王建华, 汤光明, 裴庆祺, 张玉臣, 刘小虎. 一种智能高效的最优渗透路径生成方法[J]. 计算机研究与发展, 2019, 56(5): 929-941. DOI: 10.7544/issn1000-1239.2019.20190012
    引用本文: 王硕, 王建华, 汤光明, 裴庆祺, 张玉臣, 刘小虎. 一种智能高效的最优渗透路径生成方法[J]. 计算机研究与发展, 2019, 56(5): 929-941. DOI: 10.7544/issn1000-1239.2019.20190012
    Wang Shuo, Wang Jianhua, Tang Guangming, Pei Qingqi, Zhang Yuchen, Liu Xiaohu. Intelligent and Efficient Method for Optimal Penetration Path Generation[J]. Journal of Computer Research and Development, 2019, 56(5): 929-941. DOI: 10.7544/issn1000-1239.2019.20190012
    Citation: Wang Shuo, Wang Jianhua, Tang Guangming, Pei Qingqi, Zhang Yuchen, Liu Xiaohu. Intelligent and Efficient Method for Optimal Penetration Path Generation[J]. Journal of Computer Research and Development, 2019, 56(5): 929-941. DOI: 10.7544/issn1000-1239.2019.20190012

    一种智能高效的最优渗透路径生成方法

    Intelligent and Efficient Method for Optimal Penetration Path Generation

    • 摘要: 在考虑未知攻击和内部攻击条件下,为进一步提高最优渗透路径生成效率,提出一种智能高效的最优渗透路径生成方法.首先给出双层威胁渗透图(two-layer threat penetration graphs, TLTPG)模型,其下层为主机威胁渗透图(host threat penetration graph, HTPG),其上层为网络威胁渗透图(network threat penetration graph, NTPG);然后,基于知识图谱,构建主机资源知识图谱(host resource knowledge graph, HRKG),用于智能高效推理生成HTPG;进一步,利用HTPG,设计智能化的基于渗透信息交换的NTPG生成算法;最后依据TLTPG,设计任意2个主机间的最优渗透路径生成算法.实验结果表明:该方法能够描述未知攻击和内部攻击,且可提高最优渗透路径的生成效率.

       

      Abstract: Considering the insider and unknown attack, to further improve the efficiency, an intelligent-efficient method for generating the optimal penetration path is put forward. Firstly, we define the two-layer threat penetration graph(TLTPG), where the lower layer is called host threat penetration graph(HTPG) and the upper layer is called network threat penetration graph(NTPG). Then, based on knowledge graph, we build the host resource knowledge graph(HRKG), which is used to generate the HTPG intelligently and efficiently. Further, utilizating the HTPG, we design the NTPG generation algorithm based on penetration information exchange. Finaly, we describe the algorithm of optimal penetration path generation by using the TLTPG. Experimental results show that the proposed method can improve the efficiency of generating the optimal penetration path under the condition that the insider and unknown attack are considered.

       

    /

    返回文章
    返回