发表状态 | 已发表Published |
题名 | The construction and application of network attack graph |
作者 | |
发表日期 | 2009 |
发表期刊 | China Communications
![]() |
ISSN/eISSN | 1673-5447 |
卷号 | 6期号:4页码:71-74 |
摘要 | With the development of computer networks, the attacks with respect to them are increasing explosively. It is a very important problem for security testers to test the security situation of a specific network (i.e., to use a method to model all the possible attacks within the environment). Of all the modeling methods, the Network Attack Graph is widely used because of its visual intuition. Under this circumstance, this paper firstly introduces the construction methods of the Network Attack Graph, then describes its application in the network security, and lastly previews some research directions of the Network Attack Graph. |
关键词 | Network attack Network attack graph Penetration test |
URL | 查看来源 |
收录类别 | SCIE |
语种 | 英语English |
WOS研究方向 | Telecommunications |
WOS类目 | Telecommunications |
WOS记录号 | WOS:000272423100008 |
Scopus入藏号 | 2-s2.0-77956021827 |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | https://repository.uic.edu.cn/handle/39GCC9TT/13570 |
专题 | 个人在本单位外知识产出 |
通讯作者 | Wang, Yonggang |
作者单位 | 1.Department of Computer Science and Technology,Peking University,Beijing 100871,China 2.Research Institute of Machinery Economic and Management,Beijing 100055,China |
推荐引用方式 GB/T 7714 | Wang, Yonggang,Miao, Yi,Yang, Yanget al. The construction and application of network attack graph[J]. China Communications, 2009, 6(4): 71-74. |
APA | Wang, Yonggang, Miao, Yi, Yang, Yang, Chen, Zhong, & Hu, Jianbin. (2009). The construction and application of network attack graph. China Communications, 6(4), 71-74. |
MLA | Wang, Yonggang,et al."The construction and application of network attack graph". China Communications 6.4(2009): 71-74. |
条目包含的文件 | 条目无相关文件。 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论