Font Size: a A A

Network Vulnerability Assessment Research Based On Petri Net

Posted on:2011-04-15Degree:MasterType:Thesis
Country:ChinaCandidate:Q ZhangFull Text:PDF
GTID:2178330332460131Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, computer networks in all areas of social life are playing an increasingly important role. The open network and malicious acts of the network attacks bring security threat to us. How to detect security vulnerabilities that exist in the network initiatively to strengthen the network safety performance and reduce the threat of attack has become one important issue of network security.In the computer security field, particularly in the field of network security, vulnerability assessment is very important. Our goal is to get a network security evaluation, including qualitative analysis and quantitative analysis to help system management and users aware of the network vulnerabilities and weaknesses in a timely manner. With the result, the users can carry out repair and maintenance timely and effectively to avoid unnecessary attacks.This article research the network system security assessment of the vulnerability assessment and analysis of qualitative and quantitative analysis and study the network vulnerability modeling of the new method is proposed based on Petri network model. Petri net modeling and analysis techniques provides a graphical and mathematical method and suitable for network management research and use. The main work done by this article:Study the development and history of network vulnerability and Petri net theory and modeling methods. Model the network of vulnerability graphical, formulaic, and the automatic generation of network model algorithm using Petri nets. The different characteristics of network vulnerability are extracted to form a correlation model. After scanning the network, the Petri net reflects the correlations between vulnerabilities. This model especially applicable to describing in detail of penetration attacks. It can get all the attack paths of every host-state and analyze the reachability of one target host-state.This article also focused on colored Petri net modeling approach which is simple and efficient method of modeling. With sophisticated modeling tools CPN Tools, we can simulate the same vulnerability testing to achieve the desired purpose to identify potential attacks initiatively. We try to get potential attack steps and attack sequences at the same time.Finally, this paper work also involves a vulnerability analysis method and network reachability analysis of the Petri net model. It has been proven an effective way to avoid the space explosion problem brought by graphical modeling with the growth of the size of graphics. This method is started from the results, reversely to find the original state of the network is whether safe or not. In that way, no other redundancy status will take into consideration.
Keywords/Search Tags:Computer Network, Information Security, Vulnerability, Vulnerability Modeling, Petri Net
PDF Full Text Request
Related items