[1]中国互联网络信息中心[EB/OL].[2017-01-20].http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201701/t20170122_66437.htm.
[2]Symantec[EB/OL].[2017-01-21].https://www.symantec.com/about/new-sroom/press-kits/istr-22.
[3]KIJSANAYOTHIN P,HEWETT R.Analytical approach to attack graph analysis for network security[C]//Proceedings of International Conference on Availability.Washington D.C.,USA:IEEE Press,2010:25-32.
[4]吴迪,连一峰,陈恺,等.一种基于攻击图的安全威胁识别和分析方法[J].计算机学报,2012,35(9):1938-1950.
[5]YOUNIS A,MALAIYA Y K,RAY I,et al.Evaluating CVSS base score using vulnerability rewards programs[M].Berlin,Germany:Springer-Verlag,2016.
[6]鲍旭华,戴英侠,冯萍慧,等.基于入侵意图的复合攻击检测和预测算法[J].软件学报,2005,16(12):2132-2138.
[7]XIE Peng,LI J H,OU Xinming,et al.Using Bayesian networks for cyber security analysis[C]//Proceedings of the 40th IEEE/IFIP International Conference on Dependable Systems and Networks.Washington D.C.,USA:IEEE Press,2010:211-220.
[8]POOLSAPPASIT N,DEWRI R,RAY I.Dynamic security risk management using Bayesian attack graphs[J].IEEE Transactions on Dependable and Secure Computing,2012,9(1):61-74.
[9]王硕,汤光明,寇广,等.基于因果知识网络的攻击路径预测方法[J].通信学报,2016,37(10):188-198.
[10]CHINCHANI R,UPADHYAYA S,KWIAT K.Towards the scalable implementation of a user level anomaly detection system[C]//Proceedings of MILCOM’02.Washington D.C.,USA:IEEE Press,2002:1503-1508.
[11]王辉,刘淑芬.一种可扩展的内部威胁预测模型[J].计算机学报,2006,29(8):1346-1355.
[12]叶云,徐锡山,贾焰.基于攻击图的网络安全概率计算方法[J].计算机学报,2010,33(10):1987-1996.
[13]陈小军,方滨兴,谭庆丰.基于概率攻击图的内部攻击意图推断算法研究[J].计算机学报,2014,37(1):62-72.
[14]李艳,黄光球.基于可能图的攻击意图检测方法[J].计算机工程与科学,2017,39(4):698-707.
[15]张少俊,李建华,宋珊珊,等.贝叶斯推理在攻击图节点置信度计算中的应用[J].软件学报,2010,21(9):2376-2386. |