JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2012, Vol. 35 ›› Issue (1): 19-23.doi: 10.13190/jbupt.201201.19.zhongshq
• Papers • Previous Articles Next Articles
Network Security Analysis Based on Host-Security-Group
ZHONG Shang-qin, XU Guo-sheng, YAO Wen-bin,YANG Yi-xian
- 1.Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China;2. National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
-
Received:
2011-04-16Revised:
2011-07-07Online:
2012-02-28Published:
2012-01-05
CLC Number:
Cite this article
share this article
Add to citation manager EndNote|Ris|BibTeX
URL: https://journal.bupt.edu.cn/EN/10.13190/jbupt.201201.19.zhongshq
[1]Ortalo R, Deswarte Y, Kaaniche M Experimenting with quantitative evaluation tools for monitoring operational security[J]. IEEE Transactions on Software Engineering, 1999, 25(05):633-650. [2]Swiler L P, Phillips C, Ellis D. Computer attack graph generation tool[C]∥Proc of the Second DARPA Information Survivability Conference & Exposition (DISCEX II). Anaheim:[s.n.], 2001:307-321. [3]Ammann P, Wijesekera D, Kaushik S. Scalable graph based network vulnerability analysis[C]∥Proc of the 9th ACM Conference on Computer and Communications Security. New York:[s.n.], 2002:217-224. [4]Noel S, Jajodia S. Managing attack graph complexity through visual hierarchical aggregation[C]∥Proc of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. Washington DC:[s.n.], 2004:109-118. [5]Zhang Tao, Hu Mingzeng, Li Dong. An effective method to generate attack graph[C]∥Proc of International Conference on Machine Learning and Cybernetics. Guangzhou:[s.n.], 2005:3926-3931. [6]苘大鹏, 周渊, 杨武. 用于评估网络整体安全性的攻击图生成方法[J]. 通信学报, 2009, 30(3):1-5. Man Dapeng, Zhou Yuan, Yang Wu. Method to generate attack graphs for assessing the overall security of networks[J].Journal on Communications, 2009,30(3):1-5. [7]The MITRE Corporation. Common attack pattern enumeration and classification[EB/OL]. 2011. http:∥capec.mitre.org/data/dictionary.html. |
[1] | SHI Zicheng, LI Xin, TANG Ying, HUANG Shanguo. Optical Packet Filtering System Based on All-Optical Pattern Matching [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(3): 96-101. |
[2] | YANG Hongyu, YUAN Haihang, ZHANG Liang. A Risk Assessment Method of Network Host Node with Host Importance [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(2): 16-21. |
[3] | ZHANG Lei, CHEN Chuan, TAN Qi-yun, HAO Mao-xin, YANG Xue-kang. An Image Encryption Algorithm Combining S-Box and Chaotic Mapping [J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(6): 40-47. |
[4] | YANG Hong-yu, ZHANG Le, ZHANG Liang. An Information System Risk Assessment Method Based on Risk Propagation [J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(4): 41-48. |
[5] | TANG Hong-wei, FENG Sheng-zhong, ZHAO Xiao-fang. TOChain: a High-Performance SFC for Virtual Network Security [J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 70-80. |
[6] | ZHAO Jian, WANG Rui, LI Zheng-min, LEI Min, MA Min-yao. Security Threats and Risk Assessment of IoT System [J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 135-139. |
[7] | LEI Min, LIU Xiao-ming, ZHANG Hong, WANG Mian, YANG Yu. Research on Security Threats and Risk Assessment of Web Information System [J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(s1): 87-93. |
[8] | LI Xu, BAO Jing-jing, LIU Ying. Formation Security: Black Hole Problem [J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 12-17. |
[9] | BAI Yuan, WANG Qian, JIA Qi-lan, ZHANG Hui-bing. An Efficient and Secured AKA for EPS Networks [J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 10-14. |
[10] | LIU Jing, GU Li-ze, Niu Xin-xin, YANG Yi-xian, LI Zhong-xian. Network Security Events Analyze Method Based on Neural Networks and Genetic Algorithm [J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 50-54. |
[11] | FU Yu, CHEN Yong-qiang, WU Xiao-ping, SONG Yan. Network Attack-Defense Strategies Selection Based on Stochastic Game Model [J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 35-39. |
[12] | CHEN Yong-qiang, WU Xiao-ping, FU Yu, SONG Yan. Network Security Evaluation Based on Stochastic Game and Network Entropy [J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 92-96. |
[13] | GE Hai-hui, ZHENG Shi-hui, CHEN Tian-ping, YANG Yi-xian. Fuzzy Risk Assessment of Information Security Threat Scenario [J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 89-92,107. |
[14] | . Network Security Assessment Based on Node Correlated HMM [J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(6): 121-124. |
[15] | WU Huan, PAN Lin, WANG Xiao-zhen, XU Rong-sheng. A Risk Assessment Model Using Incomplete Attack Graphs Analysis |
Viewed | ||||||
Full text | | |||||
Abstract | | |||||