期刊文献+

网络安全脆弱性检测复合模型及应用 被引量:1

Research on network security vulnerability checking compound model and application
在线阅读 下载PDF
导出
摘要 介绍了对脆弱性检测的一般规则进行扩充而建立的脆弱性检测复合模型,并结合CVE实例,对复合模型的算法进行了研究.在对复合模型进行分解的基础上,对复合模型中的应用层和功能层分别进行插件化实现.应用证明,该方法大大提高了检测效率,并具有良好的可操作性和扩充能力. The vulnerability checking compound model is introduced, which is established by extending the common vulnerability checking rules. Then the algorithm of compound model is studied by the aid of a CVE case. Based on disassemble of compound model, the application level and function level of compound model are implemented with plug-ins technique. The practice shows that the new methods can greatly raising the efficiency of vulnerability test, and have good operability and expendability.
作者 冯兵 张静平
机构地区 军械工程学院
出处 《海军航空工程学院学报》 2007年第2期281-284,共4页 Journal of Naval Aeronautical and Astronautical University
关键词 网络安全 脆弱性检测 复合模型 network security vulnerability checking compound model
  • 相关文献

参考文献5

二级参考文献41

  • 1KPMG Peat Marwick LLP.Vulnerability Assessment Framework 1.1[M]. CIAO publications, 1998.
  • 2Eric Knight.Computer Vulnerabilities[M].2000.
  • 3John R Sciandra.Holistic Vulnerability Assessment Methodologies. http ://www.nacon.com/papers/whitepaper.pdf, 2001.
  • 4Gary Stoneburner,Alice Goguen,Alexis Feringa.NIST Special Publication 800-30:Risk Management Guide for Information Technology System[M].WASHINGTON:U S GOVERNMENT PRINTING OFFICE, 2001.
  • 5ISS.Network and Host-based Vulnerability Assessment:A guide for information systems and network security professionals.http://documents.iss.net/whitepapers/nva.pdf, 2001.
  • 6BISHOP M. A Taxonomy of UNIX System and Network Vulnerabilities [A], Technical Report 95 - 10, Department of Computer Sciences [C].University of California, at Davis, 1995.
  • 7CARL Landwher, et al. A Taxonomy of Computer Grogram Security Flaws. Technical report [M].Naval Research Laboratory,November, 1993.
  • 8ASLAM Taimur, KRSUL Ivan, SPAFFORD Eugene. Use of Taxonomy of Security Faults [A]. 19th National Information System Security Conference[C]. Baltimore, Maryland, 1996. 22-25.
  • 9NING Peng, WANG X Sean. JAJODIA Sushil. A query facility for common intrusion detection framework [A]. In Proceedings of the 23rd National Information Systems Security Conference [C].Baltimore, MD, 2000.
  • 10Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996

共引文献96

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部