[1] Frigault M, Wang L Y, Singhal A, et al. Measuring network security using dynamic Bayesian network //Conference on Computer and Communications Security Proceedings of the 4th ACM Workshop on Quality of Protection. New York, USA:ACM, 2008:23-30. [2] Feng P H, Lian Y F, Dai Y X, et al. A vulnerability model of distributed systems based on reliability theory[J]. Journal of Software, 2006,17(7):1633-1640(in Chinese). 冯萍慧,连一峰,戴英侠,等. 基于可靠性理论的分布式系统脆弱性模型[J]. 软件学报, 2006,17(7):1633-1640. [3] Zhang H X, Su P R, Feng D G. A network security analysis model based on the increase in attack ability[J]. Journal of Computer Research and Development, 2007,44(12):2012-2019(in Chinese). 张海霞,苏璞睿,冯登国. 基于攻击能力增长的网络安全分析模型[J]. 计算机研究与发展, 2007,44(12):2012-2019. [4] Jiang W, Fang B X, Tian Z H, et al. Evaluating network security and optimal active defense based on attack-defense game model[J]. Chinese Journal of Computers, 2009, 32(4):817-825(in Chinese). 姜伟,方滨兴,田志宏,等. 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2009, 32(4): 817-825. [5] Sawilla R, Ou X M. Googling attack graphs . Defence R & D,Canada,Ottawa, Tech. Rep: TM 2007-205, 2007. [6] FIRST. A complete guide to the common vulnerability scoring system version 2.0 . .http://www.first.org/cvss/cvss-guide.html. [7] Barthelemy M. Betweenness centrality in large complex networks[J].Eurpean Physical Journal B,2004,38(2):163-168. [8] Steven N, Sushil J D, Brian O B, et al. Efficient minimum-cost network hardening via exploit dependency graphs //Proceedings of ACSAC. 2003:86-95. [9] National Institute of Standards and Technology. National vulnerability database . .http://nvd.nist.gov/. [10] Bugtraq Vulnerability Archives. SecurityFocus . .http://www.securityfocus.com/vulnerabilities. |