ATTACK MODELING OF NETWORK SECURITY BY MEANS OF PETRI NETS


如何引用文章

全文:

详细

It covers instruction system of network security setting on the basis of attack modeling and network security settings by means of hierarchical Petri Nets. It covers modeling features taking into consideration program vulnerabilities.

作者简介

N Kalinina

Email: kna@akadem.ru

参考

  1. McDermott, J. P. Attack Net Penetration Testing / J. P. McDermott // Proc. of the 2000 Workshop on New Security Paradigm. New Y ork : ACM Press, 2000. P . 15-21.
  2. Colore d P e tr i N et B as e d A ttac k Mo de ling / S hij ie Z hou, Zhiguang Qin, Feng Zhang et al. // Rough Sets, Fuzzy Sets, D a ta M ini ng, and G ra nula r C o mpu ting : P ro c . o f the 9t h I nte rn. Conf. Chongqing, China, 2003. P . 715-718.
  3. Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets / O. M. Dahl, S. D. Wolthusen // Proc. of the 4th IEEE Intern. Inform. W orkshop. Royal Holloway , UK, 2006. P . 157-168.
  4. Commo n A t tac k P at te rn Enume ratio n and C l as s if ic a tio n [Electr onic r esour ce]. Electr onic data. Access mode: <http://>cape c.mitr e .org/data/dic tionar y .html. Title from display .
  5. Common Vulnerabilities and Exposures [Electronic re so urce ]. Ele c tro nic data. Ac c e ss mode : <http://C> v e.mitre .org. Title from display .
  6. National V ulnerability Database [Electronic resource]. Elec tronic data. Ac ce ss mode: <http://Nv> d.nist.gov . Title from display.
  7. Низамутдинов, М. Ф. Тактика защиты и нападения на web-приложения / М. Ф. Низамутдинов. СПб. : БХВ-Петербург, 2005.

补充文件

附件文件
动作
1. JATS XML

版权所有 © Kalinina N.A., 2009

Creative Commons License
此作品已接受知识共享署名 4.0国际许可协议的许可