Font Size: a A A

Research Of Cyber Attack Decision Base On Attack Tree And Fuzzy-AHP

Posted on:2011-03-04Degree:MasterType:Thesis
Country:ChinaCandidate:X YuFull Text:PDF
GTID:2178330338982944Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, network has become a major component of the global information infrastructure, make the life, work& communication convenient, the network security is facing many potential threats result in the network is open& interconnected, and easy attacked by hackers, malware and other illegal actions. Actually, the network is a double-edged sword, it brings great challenge to public and nation security while promotes the progress of human.Nowadays, attacks shows uncertainty, complexity and diversity, and is developing to the direction of extension, cooperation and multi-layers, therefore the requirements of prevention and maintenance networks are becoming more and more high, we need understand and describe the attack properly, establish an effective formal model to analyse the attack qualitatively and quantitatively. In order to estimate the system security, oversea start to research the network attack and cyber-attack in the simulative real network environment. As limitation of network attack, we need to develop a model to help for make decision, not only can describe the attack accurately, but also estimate the result of different attacks reasonably, help the hacker to choose the best plan, at certain extent, make up the weakness in decision-making and estimate area of the attackThis paper is based on the actual project, I have finished below work: simulates the real network attack and defense, the virtual environment, the process of decision support, shows the real time attack-defense process, verify the network decision-making is accurate and intelligent from engineering application. Firstly, analyse the way of establish attack model, select the attack tree to model and research the related-path to generate algorithm, in order to get all ways of attack; then based on multi-objective decision-making, establish the decision-making attack system, combine AHP and fuzzy comprehensive evaluation method to estimate the way of attack and choose the optimal way in the sense of probability. This paper focuses on the method of establish model and decision-making model, research and analysis in the actual project, verify the validity and feasibility of the attack model which based on attack tree and fuzzy-AHP ,further shows its meaning and value.
Keywords/Search Tags:cyber attack, modeling, attack tree, fuzzy-AHP, decision-making
PDF Full Text Request
Related items