• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Wang, Xiu-Juan (Wang, Xiu-Juan.) | Sun, Bo (Sun, Bo.) | Liao, Yan-Wen (Liao, Yan-Wen.) | Xiang, Cong-Bin (Xiang, Cong-Bin.)

收录:

EI Scopus PKU CSCD

摘要:

For assessing the vulnerability of computer network accurately and comprehensively, the problem of attack loops, the state explosion and analyzing qualitatively were researched. The method of converting attribute attack graph to the Bayesian network and the new loop elimination algorithm was also proposed. By using these two algorithms, a new Bayesian attribute attack graph model was build. The formula of assessing indicators was derived by Bayesian formula. The data of common vulnerability scoring system was used to compute the probability of attribute nodes and indicators to conduct network vulnerability assessment. Experiments analysis proves the feasibility and effectiveness of the model. Compared with other methods of vulnerability assessment, this model has simple calculation which is suitable for dynamic quantitative assessment. © 2015, Beijing University of Posts and Telecommunications. All right reserved.

关键词:

Chemical analysis Computer networks Bayesian networks Network security

作者机构:

  • [ 1 ] [Wang, Xiu-Juan]Computer Institute, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [Sun, Bo]Computer Institute, Beijing University of Technology, Beijing; 100124, China
  • [ 3 ] [Liao, Yan-Wen]Computer Institute, Beijing University of Technology, Beijing; 100124, China
  • [ 4 ] [Xiang, Cong-Bin]Computer Institute, Beijing University of Technology, Beijing; 100124, China

通讯作者信息:

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

Journal of Beijing University of Posts and Telecommunications

ISSN: 1007-5321

年份: 2015

期: 4

卷: 38

页码: 106-112

被引次数:

WoS核心集被引频次:

SCOPUS被引频次: 6

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

归属院系:

在线人数/总访问数:527/3903895
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司