期刊文献+

CODEREDII攻击行为的分析 被引量:2

ANALYSIS ON CODEREDII ATTACK BEHAVIORS
下载PDF
导出
摘要 网络攻击行为的频度和复杂性使安全防御的难度越来越大。网络攻击行为分析方法因而引起人们的关注。本文采用一种具有普适性的攻击树方法。以CODEREDII为实例 ,介绍了攻击树的构造和具体应用并清晰地展示了CODEREDII的攻击行为和具体的实现方式。利用此攻击树 ,不仅可以了解各种网络攻击行为 ,把握攻击的本质 。 The frequency and complexity of network attack behaviors make securities withstand more difficult the method of analysis on network attack behaviors have been given more attention by people.This paper uses one of the wide and applicable methods of attack tree and takes example for CODEREDII and introduces the construction of attacks tree and a material application and clearly shows the attack behaviors of CODEREDII and the material implement means.By using the attack tree not only does people know all kinds of network attack behaviors and hold the essence of attacks,but also simulate the network attack behaviors and implement the qualitative and even quantitative evaluation on attacks.
作者 张涛 董占球
出处 《计算机应用与软件》 CSCD 北大核心 2004年第6期84-88,共5页 Computer Applications and Software
关键词 CODEREDII 网络攻击行为 网络安全 传播性 木马功能 攻击树分析方法 Network security Network attacks Attack tree Security evaluation
  • 相关文献

参考文献9

  • 1[1]http:∥www.cert.org/stats/.
  • 2[2]Howard,A Taxonomy of Computer and Network Attacks,http: ∥www. cert.org/research/JHThesis/Word6/chap06. doc, pp.53 ~ 72.
  • 3[3]http:∥www.ll.mit.edu.
  • 4[4]Peter G. Neumann and Donn B. Parker, A summary of cmputer misuse techniques,in Proceedings of the 12th National Computer Security Conference, pp.396 ~ 407. National Institute of Standards, October 1998.
  • 5[5]Jeffrey Undercoffer and John Pinkston, Modeling Computer Attacks:A Target-Centric Ontology for Intrusion Detection, Under review IEFE First International Workshop on Information Assurance, 2002. http: ∥www. csee. umbc. edu/cadip/2002Symposium/Ont- for-IDS. pdf.
  • 6[6]http:∥www. schneier.com/Schneier_ com Attack Trees.htm.
  • 7[7]http:∥docshow.mtc.dhs.org/ids.htm.
  • 8[9]http: ∥securityfocus. com/bid/2880.
  • 9[10]http: ∥www. eeye. com/html/advisories/coderedll.

同被引文献9

  • 1.[EB/OL].http: //www.cert.org.,.
  • 2.[EB/OL].http: //www. nsfocus.com.,.
  • 3Aleph One. Smashing The Stack For Fun And Profit. Phrack, 7(49),November 1996.
  • 4.Matt Conover溢出机理分析[EB/OL].http: //www.w00w00.org/files/articles/heaptut.txt.,.
  • 5Alfred V.Aho R.Hopcroftand Jeffrey D. Ullman, Compliers:Principles,Techniques and Tools. Addsion-Wesley, Reading, Mass.1985.
  • 6.Rix. SMASHING C++ VPTRS[EB/OL].http: //www.phrack org/show.php?p=56&a=8.,.
  • 7.Warning3.书写Linux下自己的shellcode[EB/OL].http: //security.nsfocus.com/showQueryL. asP? libID=256.,.
  • 8.[EB/OL].http: //www. schneier. com/Schneier_com Attack Trees.htm.,.
  • 9刘绍翰,许建真,张福炎.基于缓冲溢出漏洞的攻击及其预防研究综述[J].计算机应用与软件,2004,21(1):83-87. 被引量:8

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部