作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2018, Vol. 44 ›› Issue (8): 155-160. doi: 10.19678/j.issn.1000-3428.0047775

• 安全技术 • 上一篇    下一篇

面向APT攻击的分层表示模型

樊雷,余江明,雷英杰   

  1. 空军工程大学,西安 710051
  • 收稿日期:2017-06-30 出版日期:2018-08-15 发布日期:2018-08-15
  • 作者简介:樊雷(1981—),男,讲师、博士研究生,主研方向为智能信息处理、信息融合;余江明,副教授;雷英杰,教授、博士生导师。
  • 基金资助:

    国家自然科学基金(61272011,61309022);陕西省自然科学青年基金(2013JQ8031)。

Hierarchical Representation Model for APT Attack

FAN Lei,YU Jiangming,LEI Yingjie   

  1. Air Force Engineering University,Xi’an 710051,China
  • Received:2017-06-30 Online:2018-08-15 Published:2018-08-15

摘要:

针对窃密型APT攻击缺乏形式化表示的问题,建立一种窃密型APT攻击分层表示模型APT-HRM。参考HARM模型将APT攻击分为攻击链和攻击树上下2层,并对其进行形式化定义。攻击链由侦察、渗透、开采和撤出4个阶段组成,攻击树由攻击链各阶段所对应的攻击手段组成,APT按 照攻击链分阶段依次进行攻击。对DUQU 2.0 APT攻击的分析结果表明,该模型能够有效描述窃密型APT攻击行为。

关键词: APT攻击, 攻击链, 攻击树, 分层表示模型, DUQU 2.0攻击分析

Abstract:

In view of the lack of formal representation of the theft type APT attack,a hierarchical APT representation model is built which named APT-HRM.Referring to the HARM model,the APT attacks are divided into two layers:Attack Chain(AC) and Attack Tree(AT).The AC is composed of 4 stages:reconnaissance,infiltration,exploitation and exfiltration.The AT is composed of attack means in each stage of the AC,and the APT attacks are carried out in stages according to the AC.Analysis results of DUQU 2.0 APT attack show that,the model can effectively describe the APT attack behavior.

Key words: APT attack, Attack Chain(AC), Attack Tree(AT), hierarchical representation model, DUQU 2.0 attack analysis

中图分类号: