科研成果详情

发表状态已发表Published
题名The construction and application of network attack graph
作者
发表日期2009
发表期刊China Communications
ISSN/eISSN1673-5447
卷号6期号:4页码:71-74
摘要

With the development of computer networks, the attacks with respect to them are increasing explosively. It is a very important problem for security testers to test the security situation of a specific network (i.e., to use a method to model all the possible attacks within the environment). Of all the modeling methods, the Network Attack Graph is widely used because of its visual intuition. Under this circumstance, this paper firstly introduces the construction methods of the Network Attack Graph, then describes its application in the network security, and lastly previews some research directions of the Network Attack Graph.

关键词Network attack Network attack graph Penetration test
URL查看来源
收录类别SCIE
语种英语English
WOS研究方向Telecommunications
WOS类目Telecommunications
WOS记录号WOS:000272423100008
Scopus入藏号2-s2.0-77956021827
引用统计
文献类型期刊论文
条目标识符https://repository.uic.edu.cn/handle/39GCC9TT/13570
专题个人在本单位外知识产出
通讯作者Wang, Yonggang
作者单位
1.Department of Computer Science and Technology,Peking University,Beijing 100871,China
2.Research Institute of Machinery Economic and Management,Beijing 100055,China
推荐引用方式
GB/T 7714
Wang, Yonggang,Miao, Yi,Yang, Yanget al. The construction and application of network attack graph[J]. China Communications, 2009, 6(4): 71-74.
APA Wang, Yonggang, Miao, Yi, Yang, Yang, Chen, Zhong, & Hu, Jianbin. (2009). The construction and application of network attack graph. China Communications, 6(4), 71-74.
MLA Wang, Yonggang,et al."The construction and application of network attack graph". China Communications 6.4(2009): 71-74.
条目包含的文件
条目无相关文件。
个性服务
查看访问统计
谷歌学术
谷歌学术中相似的文章
[Wang, Yonggang]的文章
[Miao, Yi]的文章
[Yang, Yang]的文章
百度学术
百度学术中相似的文章
[Wang, Yonggang]的文章
[Miao, Yi]的文章
[Yang, Yang]的文章
必应学术
必应学术中相似的文章
[Wang, Yonggang]的文章
[Miao, Yi]的文章
[Yang, Yang]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。