期刊文献+

计算机漏洞库系统的设计、实现与应用 被引量:12

The Design, Implementation and Application of a Computer Vulnerability Database System
下载PDF
导出
摘要 如何发现、修补和利用计算机漏洞 ,是网络攻防研究的焦点问题之一。本文首先对国内外的研究现状进行分析与综述 ,然后介绍了如何设计、实现计算机漏洞库系统 ,提出了运用CORBA分布对象技术定义和实现漏洞库信息的应用程序访问接口 ,基于事件模型完成漏洞补丁程序或应对措施在可信任计算机之间的自动推送 ,实现动态的系统漏洞分析与应对。 How to discover, fix and exploit computer system vulnerabilities has been one of the focuses of the study on network security. In the paper, we summarize and analyze the related research first, then we describe how to design and implement a vulnerability database, put forward methods based on CORBA to define and implement the application programming interfaces of the vulnerability database, accomplish the automatic push of patches among trusted computers based on event models, and achieve a dynamic analysis and reaction of vulnerabilities.
出处 《计算机工程与科学》 CSCD 2004年第7期31-33,共3页 Computer Engineering & Science
基金 国家 8 63计划资助项目 ( 2 0 0 1AA14 2 0 90 ) 国家网络与信息安全管理中心资助项目 ( 2 0 0 1 研 2 A 0 14 )
关键词 计算机漏洞库系统 设计 信息安全 网络安全 网络攻击 计算机网络 computer system vulnerability vulnerability database event model patch push
  • 相关文献

参考文献1

二级参考文献6

  • 1[3]Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies. Department of Computer Science at the University of California at Davis, 1996
  • 2[4]Aslam T,Krsul I.Use ofa Taxonomy of Security Faults. Eugene Spaff ord.In Proceedings of the 19th National Information Systems Security Conference,1996
  • 3[5]Krsul 0Software Vulnerability Analysis. Department of Computer Scie nces, Purdue University, 1998
  • 4[6]Knight E.Computer Vulnerabilities.http://www.securityparadigmcom/, 2000
  • 5[1]Denning D E.Cryptography and Data Security. Addison-Wesley Publis hing Company, 1983
  • 6[2]Marick B.A Survey of Software Fault Surveys. University of Illinois at rbana-Champaign, 1990

共引文献57

同被引文献54

引证文献12

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部