参考文献
[1] Swiler L P, Phillips C, Ellis D, et al. Computer-attack Graph Generation Tool[C]//Proc. of the 2nd DARPA Information Survivability Conference and Exposition. Los Alamitos, USA: IEEE Computer Society Press, 2001: 307-321.
[2] Lippmann R P, Ingols K W. An Annotated Review of Past Papers on Attack Graphs[R]. Technical Report: ESC-TR-2005- 054, MIT Lincoln Laboratory, 2005.
[3] Ritchey R, Ammann P. Using Model Checking to Analyze Network Vulnerabilities[C]//Proc. of 2000 IEEE Symp. on Security and Privacy. Oakland, USA: IEEE Computer Society Press, 2000: 156-165.
[4] Jha S, Sheyner O, Wing J. Two Formal Analyses of Attack Graphs[C]//Proc. of the 15th IEEE Computer Security Foundations Workshop. Cape Breton, Canada: IEEE Computer Society Press, 2002: 49-63.
[5] 陈 锋, 张 怡, 苏金树, 等. 攻击图的两种形式化分析[J]. 软件学报, 2010, 21(4): 838-848.
[6] Jajodia S, Noel S, O’Beny B. Topological Analysis of Network Attack Vulnerability[C]//Proc. of Managing Cyber Threats: Issues, Approaches and Challenges. Boston, USA: Kluwer Academic Publisher, 2003: 3-4.
[7] Ou Xinming, Boyer W F, McQueen M A. A Scalable Approach to Attack Graph Generation[C]//Proc of the 13th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2006: 336-345.
[8] Danforth M. Models for Threat Assessment in Networks[D]. Davis, USA: University of California, 2006.
[9] Zhong Shangqin, Yan Danfeng, Liu Chen. Automatic Genera- tion of Host-based Network Attack Graph[C]//Proc. of WRI World Congress on Computer Science and Information Engineering. Los Angeles, USA: IEEE Computer Society Press, 2009: 93-98.
[10] 赵 豹. 基于攻击图的网络脆弱性分析技术研究[D]. 长沙: 国防科学技术大学, 2009.
[11] Ingols K, Lippmann R, Piwowarski K. Practical Attack Graph Generation for Network Defense[C]//Proc. of the 22nd Annual Computer Security Applications Conference. Miami Beach, USA: IEEE Computer Society Press, 2006: 121-130.
[12] Li Wei. An Approach to Graph-based Modeling of Network Ex- ploitations[D]. Starkville, USA: Mississippi State University, 2005.
[13] 赵 豹, 张 怡, 孟 源. 基于攻击模式的反向搜索攻击图生成算法[J]. 计算机工程与科学, 2011, 33(7): 18-24.
编辑 金胡考 |