计算机工程与应用 ›› 2012, Vol. 48 ›› Issue (4): 74-76.

• 网络、通信、安全 • 上一篇    下一篇

基于二叉决策图的网络可达性计算

朱随江1,2,刘 宇1,2,刘宝旭1,姜政伟1,2   

  1. 1.中国科学院 高能物理研究所 计算中心,北京 100049
    2.中国科学院 研究生院,北京 100080
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2012-02-01 发布日期:2012-04-05

Binary decision diagram-based network reachability computing

ZHU Suijiang1,2, LIU Yu1,2, LIU Baoxu1, JIANG Zhengwei1,2   

  1. 1.Computing Center, Institute of High Energy Physics, Chinese Academy of Sciences, Beijing 100049, China
    2.Graduate School, Chinese Academy of Sciences, Beijing 100080, China
  • Received:1900-01-01 Revised:1900-01-01 Online:2012-02-01 Published:2012-04-05

摘要: 针对现有攻击图生成方法中普遍通过网络扫描获得网络可达性信息存在信息不完整、耗时长、产生网络干扰等不足,提出一种基于二叉决策图的网络可达性计算方法。该方法利用二叉决策图建模防火墙规则,通过高效的集合运算计算网络可达性。真实环境检测和模拟实验均表明该方法具有精确、耗时短、无网络干扰等优点,适用于大规模网络可达性的计算,推动了攻击图在大规模网络中的应用。

关键词: 攻击图, 网络扫描, 网络可达性, 二叉决策图, 大规模网络

Abstract: Almost all of the available attack graph generating tools get network reachability through network vulnerability scanning. There are some flaws by scanning, such as incomplete information, time consuming, and side-effect on the network. It proposes a novel algorithm to compute network reachability based on binary decision diagram. The algorithm represents firewall rules by corresponding binary decision diagram, computes the reachability by efficient set operations.The algorithm is experimented and used in operational network and simulated network. The result shows that it is accurate, it consumes less time, has no side-effect on the network, and scales well, so it suits for the large-scale network reachability computing and promotes the application of attack graph in large scale network.

Key words: attack graph, network scanning, network reachability, binary decision diagram, large-scale network