论文部分内容阅读
本系统的使用方法是:通过系统绘制被分析单位的网络结构拓扑图,并输入网络配置信息,随后系统将结合网络漏洞特性,通过逻辑推理发掘漏洞之间的相互联系,生成网络中所有潜在的攻击路径,并生成可视化的攻击图,找出网络的关键节点和关键路径;根据单位实际需求选择网络安全设备数据库,系统提取关键节点或关键路径中传输速率、网络标准、端口描述、交换方式等参数,通过这些参数与安全设备数据库中的设备进行匹配,选择合理的拟部署设备,随后将这些设备拟部署在关键节点上或关键路径中,并主动整合出部署后的网络拓扑图;最后将所有信息和最终匹配结果生成一套基于漏洞分析的安全设备部署方案。
The method of using this system is to draw the topological graph of the network structure of the analyzed unit through the system and input the network configuration information. Then the system will combine the characteristics of the network vulnerabilities to discover the interconnection between the vulnerabilities through logical reasoning to generate all the potential Attack path, and generate a visual attack map to find out the key nodes and critical paths of the network. Select the network security equipment database according to the actual needs of the unit. The system extracts the transmission rate, network standard, port description and exchange mode of the key nodes or critical paths Parameters, match these parameters with the devices in the security device database, select reasonable devices to be deployed, then deploy the devices on the key nodes or in the critical paths and proactively integrate the deployed network topology map. Finally, All information and final matching results generate a set of security device deployment scenarios based on vulnerability analysis.