[1] |
JAJODIA S , NOELS . Topological vulnerability analysis:a powerful new approach for network attack prevention,detection,and response[M]// Algorithms,Architectures and Information Systems Security. World Scientific, 2008: 285-305.
|
[2] |
网络安全人才实战能力白皮书[EB]. 2022.
|
|
White paper on practical competence of cybersecurity talents[EB]. 2022.
|
[3] |
WANG G Y , WANG H M , CHEN Z J ,et al. Research on computer network attack modeling based on attack graph[J]. Journal of National University of Defense Technology, 2009,31(4): 74-80.
|
[4] |
SHEYNERO , HAINESJ JHA S . Automated generation and analysis of attack graphs[C]// Proceedings 2002 IEEE Symposium on Security and Privacy. 2004: 273-284.
|
[5] |
OBESJL , SARRAUTEC RICHARTE G . Attack planning in the real world[EB].
|
[6] |
SARRAUTE C , RICHARTE G , OBES J L . An algorithm to find optimal attack paths in nondeterministic scenarios[C]// Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence. 2011: 71-80.
|
[7] |
SARRAUTE C , BUFFET O , HOFFMANN J . Penetration testing==POMDP solving[J]. Computer Science, 2013,33(5): 535-540.
|
[8] |
JONATHON S , HANNA KI . Autonomous penetration testing using reinforcement learning[J]. arxiv preprint arxiv:1905.05965, 2019.
|
[9] |
YOUSEFI M , NHAMO M , ZHANGY , . A reinforcement learning approach for attack graph analysis[C]// 17th IEEE International Conference on Trust,Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE). 2018. 212-217.
|
[10] |
赵海妮, 焦健 . 基于强化学习的渗透路径推荐模型[J]. 计算机应用, 2022,42(6): 1689-1694.
|
|
ZHAO H N , JIAO J . Recommendation model of penetration path based on reinforcement learning[J]. Journal of Computer Application, 2022,42(6): 1689-1694.
|
[11] |
SECURITY A . Acunetix Web application security blog:statixtics from 10,000 leaked hotmail passwords[EB].
|
[12] |
VYAMAJALA S , MOHD T K , JAVAID A . A real-world Implementation of SQL injection attack using open source tools for enhanced cybersecurity learning[C]// Proceedings of 2018 IEEE International Conference on Electro/Information Technology(EIT). 2018.
|
[13] |
康海燕, 龙墨澜 . 基于吸收马尔可夫链攻击图的网络攻击分析方法研究[J]. 通信学报, 2023,44(2): 122-135.
|
|
KANG H Y , LONG M L . Research on network attack analysis method based on attack graph of absorbing Markov chain[J]. Journal on Communications, 2023,44(2): 122-135.
|
[14] |
罗智勇, 宋伟伟, 张文博 ,等. 基于 Markov 攻击图和博弈模型的区块链安全态势感知方法[J]. 电子与信息学报, 2023,45(4): 1374-1382.
|
|
LUO Z Y , SONG W W , ZHANG W B ,et al. Blockchain security situational awareness method based on Markov attack graph and game model[J]. Journal of Electronics & Information Technology, 2023,45(4): 1374-1382.
|
[15] |
王赛娥, 刘彩霞, 刘树新 . 一种基于攻击图的 5G 网络安全风险评估方法[J]. 计算机应用与软件, 2023,40(4): 289-296,335.
|
|
WANG S E , LIU C X , LIU S X . A method of 5G network security risk assessment based on attack graph[J]. Computer Applications and Software, 2023,40(4): 289-296,335.
|
[16] |
KANG J , ZHANG Y , ZHOU Z . A bayesian attack graph-based vulnerability assessment for cyber-physical power systems[J]. IEEE Transactions on Smart Grid, 2023,14(2): 139-148.
|
[17] |
SABUR A , CHOWDHARY A , HUANG D ,et al. S3:a DFW-based scalable security state analysis framework for large-scale data center networks[C]// The 22nd International Symposium on Research in Attacks,Intrusions and Defenses(RAID). 2019: 497-485.
|
[18] |
JEFFREY D J , LI J H , CHEN Z S . Reinforcement learning:an introduction[J]. Neurocomputing, 2000,35(1).
|
[19] |
CHRISTOPHER J . Q-learning[J]. Machine Learning, 1992>,8(3): 279-292.
|
[20] |
FAN J Q , WANG Z R , XIE Y C ,et al. A theoretical analysis of deep q learning[C]// Proceedings of the 2nd Conference on Learning for Dynamics and Control/Proceedings of Machine Learning Research (PMLR). 2020: 486-489.
|
[21] |
WANG Y , WANG Y , LI Y ,et al. A review on deep Q-learning for robotic control[J]. IEEE Transactions on Industrial Electronics, 2022,69(11): 9468-9481.
|
[22] |
潘刚, 米士超, 郭荣华 ,等. 基于攻击树和 CVSS 的网络攻击效果评估方法[J]. 电子技术应用, 2022,48(4): 76-80.
|
|
PAN G , MI S C , GUO R H ,et al. Evaluation method of network attack effect based on attack tree and CVSS[J]. Application of Electronic Technique, 2022,48(4): 76-80.
|