Font Size: a A A

A Network Attack Modeling Based On Attack Tree

Posted on:2009-07-16Degree:MasterType:Thesis
Country:ChinaCandidate:T H DaiFull Text:PDF
GTID:2178360272975556Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the widespread of network attack and the diversification of attack tool,the traditional network security techniques already can not adapt to the demand of network development. A new active defense system, Intrusion Detection System(IDS)based on attack tree, has become a hot research. The key point of IDS depends on how to build a simple and effective attack modeling. The key question of network attack research is how to understand and describe the attack. A complete attack process usually includes a series of attack actions, and every attack action is a use of system vulnerability. The goals of the research is:①According to the complexity of network intrusion process and the diversification of intrusion form, how to build attack scenario and reduce the complexity of building attack tree, improve attack modeling efficiency and thereby reduce occupation to network resource;②Building ID attack modeling that can describe precisely attack action, thereby giving out a correct choice in intrusion detection, establishing the foundation to obtain good detection ability;③Designing a network attack system modeling with intelligence and completion according to attack tree and attack scenario. This paper expanded and improved the establishment of attack tree and attack scenario, and the design of a network attack modeling system applying the research to attack tree. The primary works of the dissertation are as follows:①Comparison research of network attack model;②Generation algorithm research of attack tree;③Establishment of stage attack model;④Multi-Stage Network Attack Model with weights;⑤Establishment of attack scenario based on Risk weights;⑥Preliminary design of network attack model system based on attack tree. The Division of attack stage and the establishment of attack scenario based on risk weights is still meaningful to maintain network security.
Keywords/Search Tags:Attack Tree, Attack Scenario, Risk Weights, Network Attack Modeling
PDF Full Text Request
Related items