[1] |
NOURIAN A , MADNICK S . A systems theoretic approach to the security threats in cyber physical systems applied to Stuxnet[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(1): 2-13.
|
[2] |
LIANG G Q , WELLER S R , ZHAO J H ,et al. The 2015 Ukraine blackout:implications for false data injection attacks[J]. IEEE Transactions on Power Systems, 2017,32(4): 3317-3318.
|
[3] |
AKBANOV M , VASSILAKIS V G , LOGOTHETIS M D . Ransomware detection and mitigation using software-defined networking:the case of WannaCry[J]. Computers & Electrical Engineering, 2019,76: 111-121.
|
[4] |
ALLADI T , CHAMOLA V , ZEADALLY S . Industrial control systems:cyberattack trends and countermeasures[J]. Computer Communications, 2020,155: 1-8.
|
[5] |
吴晨思, 谢卫强, 姬逸潇 ,等. 网络系统安全度量综述[J]. 通信学报, 2019,40(6): 14-31.
|
|
WU C S , XIE W Q , JI Y X ,et al. Survey on network system secu-rity metrics[J]. Journal on Communications, 2019,40(6): 14-31.
|
[6] |
PHILLIPS C , SWILER L P . A graph-based system for network-vulnerability analysis[C]// Proceedings of the 1998 Workshop on New Security Paradigms - NSPW '98. 1998: 71-79.
|
[7] |
叶子维, 郭渊博, 王宸东 ,等. 攻击图技术应用研究综述[J]. 通信学报, 2017,38(11): 121-132.
|
|
YE Z W , GUO Y B , WANG C D ,et al. Survey on application of at-tack graph technology[J]. Journal on Communications, 2017,38(11): 121-132.
|
[8] |
POOLSAPPASIT N , DEWRI R , RAY I . Dynamic security risk management using Bayesian attack graphs[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(1): 61-74.
|
[9] |
MU?OZ-GONZáLEZ L , SGANDURRA D , BARRèRE M , ,et al. Exact inference techniques for the analysis of Bayesian attack graphs[J]. IEEE Transactions on Dependable and Secure Computing, 2017,16(2): 231-244.
|
[10] |
杨英杰, 冷强, 常德显 ,等. 基于属性攻击图的网络动态威胁分析技术研究[J]. 电子与信息学报, 2019,41(8): 1838-1846.
|
|
YANG Y J , LENG Q , CHANG D X ,et al. Research on network dynamic threat analysis technology based on attribute attack graph[J]. Journal of Electronics & Information Technology, 2019,41(8): 1838-1846.
|
[11] |
王辉, 王云峰, 王坤福 . 基于贝叶斯推理的攻击路径预测研究[J]. 计算机应用研究, 2015,32(1): 226-231.
|
|
WANG H , WANG Y F , WANG K F . Research on predicting attack path based on Bayesian inference[J]. Application Research of Computers, 2015,32(1): 226-231.
|
[12] |
张少俊, 李建华, 宋珊珊 ,等. 贝叶斯推理在攻击图节点置信度计算中的应用[J]. 软件学报, 2010,21(9): 2376-2386.
|
|
ZHANG S J , LI J H , SONG S S ,et al. Using Bayesian inference for computing attack graph node beliefs[J]. Journal of Software, 2010,21(9): 2376-2386.
|
[13] |
陈小军, 方滨兴, 谭庆丰 ,等. 基于概率攻击图的内部攻击意图推断算法研究[J]. 计算机学报, 2014,37(1): 62-72.
|
|
CHEN X J , FANG B X , TAN Q F ,et al. Inferring attack intent of malicious insider based on probabilistic attack graph model[J]. Chinese Journal of Computers, 2014,37(1): 62-72.
|
[14] |
黄家辉, 冯冬芹, 王虹鉴 . 基于攻击图的工控系统脆弱性量化方法[J]. 自动化学报, 2016,42(5): 792-798.
|
|
HUANG J H , FENG D Q , WANG H J . A method for quantifying vulnerability of industrial control system based on attack graph[J]. Acta Automatica Sinica, 2016,42(5): 792-798.
|
[15] |
罗智勇, 杨旭, 刘嘉辉 ,等. 基于贝叶斯攻击图的网络入侵意图分析模型[J]. 通信学报, 2020,41(9): 160-169.
|
|
LUO Z Y , YANG X , LIU J H ,et al. Network intrusion intention analysis model based on Bayesian attack graph[J]. Journal on Communications, 2020,41(9): 160-169.
|
[16] |
马春光, 汪诚弘, 张东红 ,等. 一种基于攻击意愿分析的网络风险动态评估模型[J]. 计算机研究与发展, 2015,52(9): 2056-2068.
|
|
MA C G , WANG C H , ZHANG D H ,et al. A dynamic network risk assessment model based on attacker's inclination[J]. Journal of Computer Research and Development, 2015,52(9): 2056-2068.
|
[17] |
高梦州, 冯冬芹, 凌从礼 ,等. 基于攻击图的工业控制系统脆弱性分析[J]. 浙江大学学报(工学版), 2014,48(12): 2123-2131.
|
|
GAO M Z , FENG D Q , LING C L ,et al. Vulnerability analysis of industrial control system based on attack graph[J]. Journal of Zhe-jiang University (Engineering Science), 2014,48(12): 2123-2131.
|
[18] |
叶云, 徐锡山, 齐治昌 . 大规模网络中攻击图的节点概率计算方法[J]. 计算机应用与软件, 2011,28(11): 136-139,192.
|
|
YE Y , XU X S , QI Z C . Attack graph's nodes probabilistic compu-ting approach in a large-scale network[J]. Computer Applications and Software, 2011,28(11): 136-139,192.
|
[19] |
刘贞宇, 陈羽中, 郭昆 ,等. 面向网络攻击建模的分布式过程挖掘与图分割方法[J]. 小型微型计算机系统, 2020,41(8): 1732-1740.
|
|
LIU Z Y , CHEN Y Z , GUO K ,et al. Distributed process mining and graph segmentation for network attack modeling[J]. Journal of Chinese Computer Systems, 2020,41(8): 1732-1740.
|
[20] |
吴金宇, 金舒原, 杨智 . 基于网络流的攻击图分析方法[J]. 计算机研究与发展, 2011,48(8): 1497-1505.
|
|
WU J Y , JIN S Y , YANG Z . Analysis of attack graphs based on network flow method[J]. Journal of Computer Research and De-velopment, 2011,48(8): 1497-1505.
|
[21] |
彭武, 胡昌振, 姚淑萍 . 基于攻击路径图的入侵意图识别[J]. 北京理工大学学报, 2010,30(9): 1077-1081.
|
|
PENG W , HU C Z , YAO S P . Intrusive intention recognition based on attack path graph[J]. Transactions of Beijing Institute of Tech-nology, 2010,30(9): 1077-1081.
|
[22] |
Common vulnerability scoring system version 2.0[EB].
|
[23] |
CHEMINOD M , DURANTE L , SENO L ,et al. Detection of attacks based on known vulnerabilities in industrial networked systems[J]. Journal of Information Security and Applications, 2017,34: 153-165.
|
[24] |
CHE Y B , ZHAO Y C , XU J M ,et al. A hierarchical approach for fast calculating minimal cut sets of a microgrid[J]. Mathematical Problems in Engineering, 2017,2017: 1-8.
|