Electronic Science and Technology ›› 2019, Vol. 32 ›› Issue (10): 75-78.doi: 10.16180/j.cnki.issn1007-7820.2019.10.015

Previous Articles     Next Articles

Research on Corrosion Detection Technology of Power System Grounding Grid

YANG Benyi   

  1. Information Security Evaluation Center, Yunnan Nantian Electronic Information Industry Co., Ltd. , Kunming 650000, China
  • Received:2019-01-09 Online:2019-10-15 Published:2019-10-29
  • Supported by:
    Science and Technology Project of Yunnan Science and Technology Department(2017KJF35762)


Traditional virus detection systems, network firewalls, and intrusion detection systems can only detect most of the known threats, but cannot detect potential problems in the network. To this end, the paper proposed a penetration test method based on attack graph. Firstly, considering the factors such as attack duration and attack type, the existing attack graph method was improved, and a new attack graph technique was proposed. Secondly, based on the actual application, the path, time, cost and method of the attack were based on the actual application. Based on the comprehensive considerations, the optimal attack path selection strategy of attack graph was proposed. Finally, the penetration test model based on attack graph was designed and tested. The test results showed that the penetration test algorithm could better simulate real-world attacks in the real world, and could evaluate the current state of the device, which could be applied in the actual penetration test.

Key words: attack graph, penetration test, attack map optimal attack path

CLC Number: 

  • TP91