Microsoft Word - 23 关键词: 网络安全;网络攻击路径;弱点 [gap=367]Key words: network security; network attack path; vulnerability
基于6个网页-相关网页
基于渗透模型的网络攻击路径挖掘方法,通过匹配知识库定义的基本渗透过程,模拟攻击过程中网络安全状态变迁,挖掘可能达到特定攻击目标的攻击路径。
An infiltration model-based attack path analysis method was proposed which can simulate network security state changes and give out attack paths that may lead to certain attack goals.
一条路径的带宽受到网络的物理属性的限制—攻击者在未获得更多基础设施的情况下很难增加带宽。
Bandwidth of a path is capped by the physical properties of the network-an attacker cannot easily increase bandwidth without acquiring more infrastructure.
网络攻击者通常在攻击最后目标前使用双向交互式连接一系列中间主机(跳板机)掩盖其真实攻击路径。
Usually network attackers conceal their real attacking paths by establishing interactive connections along a series of intermediate hosts (stepping stones) before they attack the final target.
应用推荐