基于本体和属性攻击图的渗透测试模型分析与系统实现-analysis and system implementation of penetration test model based on ontology and attribute attack graph.docxVIP

  • 22
  • 0
  • 约5.61万字
  • 约 66页
  • 2018-05-18 发布于上海
  • 举报

基于本体和属性攻击图的渗透测试模型分析与系统实现-analysis and system implementation of penetration test model based on ontology and attribute attack graph.docx

基于本体和属性攻击图的渗透测试模型分析与系统实现-analysis and system implementation of penetration test model based on ontology and attribute attack graph

revealsthatthepenetrationtestingmodelestablishedbymyworkisabletoestimatethe accuracyofinformationeffectively.Inaddition,thismodelcanautomatetoscreenthe availablevulnerabilityandanalyzetheirrelevance,aswellascreateapenetrationattack path,sothatthemodelcanrealizeautomaticinformationretrieval,analyzing informationandexploitingthevulnerabilityaboutpenetrationtests.Hence,itisuseful toreducethedifficultyandworkloadofinformationanalysis,andimprovethe efficiencyofpenetrationtesting.Keywords:VulnerabilitiesAssessment,PenetrationTestingmodel,PenetrationTesting Ontology,attribute-basedattackgraphs,vulnerabilitycorrelationanalysis目录中文摘要..........................................................................................................................................I英文摘要........................................................................................................................................II图表索引.......................................................................................................................................VI1 绪论...................................................................................................................................11.1问题及目标...............................................................................................................................11.2现状综述...................................................................................................................................21.3本文工作及贡献.......................................................................................................................41.4本文组织结构...........................................................................................................................52背景知识及相关技术.........................................................................................................62.1目标信息获取技术...................................................................................................................62.2信息分析方法研究..................

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档