[1] |
赵志岩, 纪小默 . 智能化网络安全威胁感知融合模型研究[J]. 信息网络安全, 2020,20(4): 87-93.
|
|
ZHAO Z Y , JI X M . Research on the intelligent fusion model of network security situation awareness[J]. Netinfo Security, 2020,20(4): 87-93.
|
[2] |
金辉, 张红旗, 张传富 ,等. 复杂网络中基于 QRD 的主动防御决策方法研究[J]. 信息网络安全, 2020,20(5): 72-82.
|
|
JIN H , ZHANG H Q , ZHANG C F ,et al. Research on active defense decision-making method based on QRD in complex network[J]. Netinfo Security, 2020,20(5): 72-82.
|
[3] |
LI M , HUANG W , WANG Y ,et al. The study of APT attack stage model[C]// 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS). 2016.
|
[4] |
CHEN P , DESMET L , HUYGENS C . A study on advanced persistent threats[C]// IFIP International Conference on Communications and Multimedia Security. 2014: 63-72.
|
[5] |
USSATH M , JAEGER D , CHENG F ,et al. Advanced persistent threats:behind the scenes[C]// 2016 Annual Conference on Information Science and Systems (CISS). 2016: 181-186.
|
[6] |
贺诗洁, 黄文培 . APT 攻击详解与检测技术[J]. 计算机应用, 2018,38(S2): 170-173.
|
|
HE S J , HUANG W P . APT attacks details and detection technology[J]. Journal of Computer Applications, 2018,38(S2): 170-173.
|
[7] |
HUTCHINS E M , CLOPPERT M J , AMIN R M . Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains[J]. Leading Issues in Information Warfare & Security Research, 2011,1(1): 80.
|
[8] |
SWILER L P , PHILLIPS C . A graph-based system for network-vulnerability analysis[R]. 1998.
|
[9] |
吴迪, 连一峰, 陈恺 ,等. 一种基于攻击图的安全威胁识别和分析方法[J]. 计算机学报, 2012,35(9): 1938-1950.
|
|
WU D , LIAN Y F , CHEN K ,et al. A security threats identification and analysis method based on attack graph[J]. Chinese Journal of Computers, 2012,35(9): 1938-1950.
|
[10] |
WU S , ZHANG Y , CAO W ,et al. Network security assessment using a semantic reasoning and graph based approach[J]. Computers & Electrical Engineering, 2017: 96-109.
|
[11] |
WANG L , LIU A , JAJODIA S . Using attack graphs for correlating,hypothesizing,and predicting intrusion alerts[J]. Computer communications, 2006,29(15): 2917-2933.
|
[12] |
AHAMADINEJAD S H , JALILI S , ABADI M . A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs[J]. Computer Networks, 2011,55(9): 2221-2240.
|
[13] |
刘威歆, 郑康锋, 武斌 ,等. 基于攻击图的多源告警关联分析方法[J]. 通信学报, 2015,36(9): 135-144.
|
|
LIU W X , ZHENG K F , WU B ,et al. Alert processing based on attack graph and multi-source analyzing[J]. Journal on Communications, 2015,36(9): 135-144.
|
[14] |
杨英杰, 冷强, 常德显 ,等. 基于属性攻击图的网络动态威胁分析技术研究[J]. 电子与信息学报, 2019,41(8): 1838-1846.
|
|
YANG Y J , LENG Q , CHANG D X ,et al. Research on network dynamic threat analysis technology based on attribute attack graph[J]. Technology Based on Attribute Attack Graph Journal of Electronics & Information Technology, 2019,41(8): 1838-1846.
|
[15] |
杨英杰, 冷强, 潘瑞萱 ,等. 基于属性攻击图的动态威胁跟踪与量化分析技术研究[J]. 电子与信息学报, 2019,41(9): 2172-2179.
|
|
YANG Y J , LENG Q , PAN R X ,et al. Research on dynamic threat tracking and quantitative analysis[J]. Technology Based on Attribute Attack Graph Journal of Electronics & Information Technology, 2019,41(9): 2172-2179.
|
[16] |
胡浩, 叶润国, 张红旗 ,等. 基于攻击预测的网络安全态势量化方法[J]. 通信学报, 2017,38(10): 122-134.
|
|
HU H , YE R G , ZHANG H Q ,et al. Quantitative method for network security situation based on attack prediction[J]. Journal on Communications, 2017,38(10): 122-134.
|
[17] |
樊雷, 余江明, 雷英杰 . 面向APT攻击的分层表示模型[J]. 计算机工程, 2018,44(8): 155-160.
|
|
FAN L , YU J M , LEI Y J . Hierarchical representation model for APT attack[J]. Computer Engineering, 2018,44(8): 155-160.
|