[1] National Internet Emergency Center.Overview of China's Internet security situation in 2018[EB/OL].[2019-07-20].https://www.cert.org.cn/publish/main/46/index.html.(in Chinese)国家互联网应急中心.2018年我国互联网安全态势综述[EB/OL].[2019-07-20].https://www.cert.org.cn/publish/main/46/index.html. [2] ABRAHAM S,NAIR S.A predictive framework for cyber security analytics using attack graphs[J].International Journal of Computer Networks and Communications,2015,7(1):1-17. [3] BAO Xuhua,DAI Yingxia,FENG Pinghui,et al.Detection and prediction algorithm of compound attack based on intrusion intention[J].Journal of Software,2005,16(12):2132-2138.(in Chinese)鲍旭华,戴英侠,冯萍慧,等.基于入侵意图的复合攻击检测和预测算法[J].软件学报,2005,16(12):2132-2138. [4] WHITLEY J N,PHAN RAPHAELC W,WANG J,et al.Attribution of attack trees[J].Computers and Electrical Engineering,2011,37(4):624-628. [5] WANG Hui,WANG Tengfei,LIU Shufen.A network attack path prediction method based on ATI[J].Computer Engineering,2016,42(9):132-137.(in Chinese)王辉,王腾飞,刘淑芬.一种基于ATI的网络攻击路径预测方法[J].计算机工程,2016,42(9):132-137. [6] YE Ziwei,GUO Yuanbo,WANG Chendong,et al.Survey on application of attack graph technology[J].Journal on Communications,2017,38(11):121-132.(in Chinese)叶子维,郭渊博,王宸东,等.攻击图技术应用研究综述[J].通信学报,2017,38(11):121-132. [7] LIU Zhenyu,CHEN Yuzhong,GUO Kun,et al. Distributed process mining and graph segmentation for network attack modeling[J].Journal of Chinese Computer Systems,2020,41(8):1732-1740.(in Chinese)刘贞宇,陈羽中,郭昆,等.面向网络攻击建模的分布式过程挖掘与图分割方法[J].小型微型计算机系统,2020,41(8):1732-1740. [8] QU Zhaoyang,LI Yaying.A network security situation evaluation method based on DS evidence theory[C]//Proceedings of the 2nd Conference on Environmental Science and Information Application Technology.Washington D.C.,USA:IEEE Press,2010:496-499. [9] GHASEMIGOL M,GHAEMI-BAFGHI A,TAKABI H.A comprehensive approach for network attack forecasting[J].Computers and Security,2016,58:83-105. [10] CHEN Xiaojun,SHI Jinqiao,XU Fei,et al.Algorithm of optimal security hardening measures against insider threat[J].Journal of Computer Research and Development,2014,51(7):1565-1577.(in Chinese)陈小军,时金桥,徐菲,等.面向内部威胁的最优安全策略算法研究[J].计算机研究与发展,2014,51(7):1565-1577. [11] LÜ Huiying,PENG Wu,WANG Ruimei,et al.A real-time network threat recognition and assessment method based on association analysis of time and space[J].Journal of Computer Research and Development,2014,51(5):1039-1049.(in Chinese)吕慧颖,彭武,王瑞梅,等.基于时空关联分析的网络实时威胁识别与评估[J].计算机研究与发展,2014,51(5):1039-1049. [12] WANG L Y,ISLAM T,LONG T,et al.An attack graph-based probabilistic security metric[M]//NIKLAS E,NIKLAS S.Lecture notes in computer science.Berlin,Germany:Springer,2008:283-296. [13] DEWRI R,RAY I,POOLSAPPASIT N,et al.Optimal security hardening on attack tree models of networks:a cost-benefit analysis[J].International Journal of Information Security,2012,11(3):167-188. [14] KUANG G C,WANG X F,YIN L R.A fuzzy forecast method for network security situation based on Markov[C]//Proceedings of 2012 International Conference on Computer Science and Information Processing.Washington D.C.,USA:IEEE Press,2012:785-789. [15] WANG Shuo,TANG Guangming,KOU Guang,et al.Attack path prediction method based on causal knowledgenet[J].Journal on Communications,2016,37(10):188-198.(in Chinese)王硕,汤光明,寇广,等.基于因果知识网络的攻击路径预测方法[J].通信学报,2016,37(10):188-198. [16] HU Hao,YE Runguo,ZHANG Hongqi,et al.Quantitative method for network security situation based on attack prediction[J].Journal on Communications,2017,38(10):122-134.(in Chinese)胡浩,叶润国,张红旗,等.基于攻击预测的网络安全态势量化方法[J].通信学报,2017,38(10):122-134. [17] HOLM H,AFRIDI K K.An expert-based investigation of the common vulnerability scoring system[J].Computers and Security,2015,53:18-30. [18] WANG Hui,LIU Shufen.A scalable predicting model for insider threat[J].Chinese Journal of Computers,2006,29(8):1346-1355.(in Chinese)王辉,刘淑芬.一种可扩展的内部威胁预测模型[J].计算机学报,2006,29(8):1346-1355. [19] JIANG Wei.Research on key technologies of active defense based on attack defense game model[D].Harbin:Harbin Institute of Technology,2010.(in Chinese)姜伟.基于攻防博弈模型的主动防御关键技术研究[D].哈尔滨:哈尔滨工业大学,2010. [20] ZHONG Shangqin,XU Guosheng,YAO Wenbin,et al.Network security analysis based on host-security-group[J].Journal of Beijing University of Posts and Telecommunica-tions,2012,35(1):19-23.(in Chinese)钟尚勤,徐国胜,姚文斌,等.基于主机安全组划分的网络安全性分析[J].北京邮电大学学报,2012,35(1):19-23. |