计算机科学 ›› 2022, Vol. 49 ›› Issue (6A): 480-484.doi: 10.11896/jsjkx.210800048
陶礼靖, 邱菡, 朱俊虎, 李航天
TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian
摘要: 对受训者训练表现的评估是提升网络安全训练成效的关键环节之一,对评估方法的研究包含了基于训练结果和基于训练行为建模的评估两个阶段,前者存在无法评价训练细节的问题,后者存在仅能对部分训练路径预建模,无法判定非预设训练路径下训练行为正确性的问题。为解决上述问题,提出了一种基于有向图和有限状态自动机的双层网络安全训练评估受训者行为描述模型,结合训练行为和训练结果各自的特点,实现对非预设训练行为的正确性判定和细节评价。针对典型网络安全训练场景的实验结果表明,相比仅关注训练行为的描述模型,该模型在提高训练行为判定准确性的同时,实现了对非预设路径训练行为正确性的判定和训练细节的刻画。
中图分类号:
[1] PATRICIU V V,FURTUNA A C.Guide for designing cyber security exercises[C]//World Scientific and Engineering Academy and Society(WSEAS).2009:172-177. [2] HENSHEL D S,DECKARD G M,LUFKIN B,et al.Predictingproficiency in cyber defense team exercises[C]//IEEE.IEEE,2016:776-781. [3] ČELEDA P,ČEGAN J,VYKOPAL J,et al.KYPO-A Platform for Cyber Defence Exercises[J/OL].https://is.muni.cz/repo/1319597/2015-NATO-MSG-133-kypo-platform-cyber-defence-exercises-paper.pdf. [4] CARLISLE M,CHIARAMONTE M,CASWELL D.UsingCTFs for an Undergraduate Cyber Education[C]//2015 USENIX Summit on Gaming,Games,and Gamification in Security Education (3GSE 15).2015. [5] VYKOPAL J,VIZVARY M,OSLEJSEK R,et al.Lessonslearned from complex hands-on defence exercises in a cyber range[C]//Proceedings of the 47th ACM Technical Symposium on Computing Science Education.2016:597-602. [6] WEISS R S,LOCASTO M E,MACHE J.A Reflective Ap-proach to Assessing Student Performance in Cybersecurity Exercises[C]//Proceedings of the 47th ACM Technical Symposium on Computing Science Education.2016:597-602. [7] ANDREOLINI M,COLACINO V G,COLAJANNI M,et al.A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises[J].Mobile Networks & Applications,2020,25(1):236-247. [8] BRAGHIN C,CIMATO S,DAMIANI E,et al.Towards theMonitoring and Evaluation of Trainees' Activities in Cyber Ranges[C]//Hatzivasilis G.,Ioannidis S.(eds) Model-driven Simulation and Training Environments for Cybersecurity.MSTEC 2020.Lecture Notes in Computer Science,Cham:Springer,2020:79-91. [9] FANG B X,JIA Y,LI A P,et al.Cyber Ranges:state-of-the-art and research challenges[J].Journal of Cyber Security,2016,1(3):1-9. [10] WANG Q X,ZHU J H,QIU H.Cybersecurity Lab Tutorial[M].Zhengzhou:Electronic Industry Press,2016. |
[1] | 黄鑫权, 刘爱军, 梁小虎, 王桁. 基于矩阵论的一致性控制算法收敛速度分析 Matrix Theory Aided Convergence Analysis of Consensus Behavior in FANET with Beacon Loss 计算机科学, 2021, 48(6): 288-295. https://doi.org/10.11896/jsjkx.201000137 |
[2] | 朱维军, 张春艳, 周清雷, 陈永华. 有向图k顶点导出子图的DNA粘贴算法 DNA Sticker Algorithm for k-vertex Induced Sub-graphs of Directed Graphs 计算机科学, 2019, 46(1): 309-313. https://doi.org/10.11896/j.issn.1002-137X.2019.01.048 |
[3] | 陈冰川,陈蔼祥,吴向军,李磊. 基于数据源向图的数据库设计中数据关系的表示工具 Representation Tool of Data Relations in Database Design Based on Data Source-target Digraph 计算机科学, 2017, 44(Z6): 470-474. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.105 |
[4] | 徐喜荣,黄亚真,张思佳,董学智. 广义Kautz有向图GK(3,n)的反馈数的界 Feedback Numbers of Generalized Kautz Digraphs GK(3,n) 计算机科学, 2016, 43(5): 13-21. https://doi.org/10.11896/j.issn.1002-137X.2016.05.003 |
[5] | 陈秋茹,文中华,袁润,戴良伟. 利用有向环的性质求解可达关系 Solving Reachability Relationship by Property of Directed Cycle 计算机科学, 2016, 43(4): 202-205. https://doi.org/10.11896/j.issn.1002-137X.2016.04.041 |
[6] | 李健利,王艺谋,谢悦,丁洪骞. 一种基于多样化历史信息的自动信任协商策略 Automated Trust Negotiation Based on Diverse History Information 计算机科学, 2016, 43(3): 122-126. https://doi.org/10.11896/j.issn.1002-137X.2016.03.025 |
[7] | 栗青生,张 莉,刘 泉,熊 晶,杨新新. 一种基于云端信息保护的汉字计算模型 Chinese Character Computing Model Based on Cloud Information Protection 计算机科学, 2015, 42(11): 73-79. https://doi.org/10.11896/j.issn.1002-137X.2015.11.015 |
[8] | 师海忠,师越. (V,R)-语言 (V,R)-Languages 计算机科学, 2014, 41(Z6): 33-36. |
[9] | 师越,师海忠. 自然语言是正则语言 Natural Languages Are Regular Languages 计算机科学, 2014, 41(Z11): 51-54. |
[10] | 侯整风,杨波,朱晓玲. 一种适合中文的多模式匹配算法 Multiple Pattern Algorithm for Chinese 计算机科学, 2013, 40(11): 117-121. |
[11] | 崔宾阁,孟翱翔. 基于最近邻有向图的遥感图像快速分割算法 Fast Remote Sensing Image Segmentation Algorithm Based on Nearest Neighbor Direct Graph 计算机科学, 2013, 40(10): 274-278. |
[12] | 陈科,谢明霞,成毅. 空间信息服务链模型的有向图表示及其验证 Geo-serviceChain Model Expression by Directed Graph and Verification 计算机科学, 2012, 39(10): 240-244. |
[13] | 郭华,李舟军,庄雷,计宏霖. 一种新的电子商务协议分析方法 New Approach for Analyzing of E-commerce Protocol 计算机科学, 2010, 37(8): 56-60. |
[14] | 陈文宇,王晓斌,程小鸥,孙世新. 形式语言与自动机中关于ε的一些问题 Issues Regarding ε in Formal Language and Automata Theory 计算机科学, 2010, 37(1): 243-244. |
[15] | 廖巍,吴晓平,严承华,钟志农. 一种新的道路网络连续查询处理方法 Novel Method for Continuous Queries Processing in Road Networks 计算机科学, 2009, 36(9): 151-153. |
|