期刊文献+

基于受害者的网络攻击行为分类方法 被引量:1

A Method of Classifying Network Attacks Based on Victims’ Viewpoint
下载PDF
导出
摘要 对网络攻击行为进行合理分类是进一步理解攻击本质的有效方法,为构建攻击防御库提供了依据.对网络攻击行为分类方法进行了研究,结合攻击步骤和安全事件响应过程,从受害者角度提出了网络攻击行为的层次化树形分类方法,并通过实例进行了描述. Reasonable classifying network attacks is an available method to understand the essence of network attacks, and it provides criterion for constructing attack-recovery database. Considering the general attack steps and response processes, network attack behavior hierarchy taxonomy based on victim's viewpoint was presented in terms of analyzing current network attack taxonomy methods, and this method was described through an example.
作者 胡乔林 李刚
出处 《空军雷达学院学报》 2005年第4期57-60,共4页 Journal of Air Force Radar Academy
关键词 网络攻击 攻击分类 安全响应 network attack attack taxonomy security response
  • 相关文献

参考文献10

  • 1[1]Edward G. Amoroso. Fundamentals of Computer Security Technology[R]. USA:Prentice-Hall PTR, 1994. 23-26.
  • 2[2]John D Howard. An Analysis of Security Incident on the Internet[D]. USA:Carnegie Mellon University, 1997.
  • 3[3]Daniel Lowry Lough. A Taxonomy of Computer Attacks with Applications to Wireless Networks[D]. USA: Virginia Polytechnic Institute and State University, 2001.
  • 4[4]Gordon Steele. Information Systems Security Incident Response[J]. IAnewsletter, 2002,(5): 14-22.
  • 5[5]Bishop M. A Taxonomy of UNIX System and Network Security Vulnerabilities [R]. USA: University of California,1995.
  • 6李昀,李伟华.基于星型网模型的安全漏洞分类[J].计算机工程与应用,2002,38(7):42-43. 被引量:7
  • 7[8]Landwehr C E, Bull A R, McDermott J P, et al. A Taxonomy of Computer Program Security Flaws[J]. ACM Computing Surveys, 1994,26(3):211-254.
  • 8[9]Lindqvist U, Jonsson E. How to Systematically Classify Computer Security Intrusions[A]. Proceedings of the IEEE[C]. IEEE, 1997.154-163.
  • 9[10]Hanies J, Lippmann R, et al. 1999 DARPA Intrusion Detection Evaluation: Design and Procedures[R]. USA:Massachusetts Institute of Technology, 2001.
  • 10马欣,张玉清,顾新,冯涛.一种面向响应的网络安全事件分类方法[J].计算机工程,2004,30(11):103-105. 被引量:4

二级参考文献11

  • 1[1]Amoroso E G.Fundamentals of Computer Security Technology. Prentiee-Hall PTR,Upper Saddle River, NJ, 1994: 23-26
  • 2[2]Bishop M.Classifying Vulnerabilities. NISSC Panel on Vulnerabilities Data:The UC Davis Vulnerabilities Project, 1996.10
  • 3[3]Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies.CSE-96-11,1996.9
  • 4[4]Landwehr C E,Bull A R,McDermott J P et al.A Taxonomy of Computer Program Security Flaws.Information Technology Division,Naval Research Laboratory,Washington,D.C.,WA 20375-5337,1994
  • 5[5]Krsul I V.Software Vulnerability Analysis[D].Ph.D.Thesis.Purdue University,Computer Sciences Department, 1998
  • 6[1]CERT Coordination Center. CERT/CC Statistics 1988-2002. http:// www.cert.org/stats/cert_stats.html
  • 7[2]Landwehr C E, Bull A R, McDermott J P, et al. A Taxonomy of Computer Program Security Flaws. ACM Computing Surveys, 1994,26 (3): 211-254
  • 8[3]Lindqvist U, Jonsson E. How to Systematically Classify Computer Security Intrusions. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland CA, 1997-05
  • 9[4]Howard J D, Longsta T A. A Common Language for Computer Security Incidents. Technical Report SAND98-8667, Sandia National Laboratories, 1998-10
  • 10[6]Carver C A, Jr. Hill J M D, Pooch U. A Methodology for Using Intelligent Agents to Provide Automated Intrusion Response. In IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, New York, 2000-06-06

共引文献8

同被引文献2

  • 1郭林,严芬,黄皓.基于多维角度的攻击分类方法[J].计算机应用研究,2007,24(4):139-143. 被引量:3
  • 2Cypress Semiconductor Corporation. 38 - 08012. CY7C68013 USB Microcontroller High-Speed USB Peripheral Controller[Z]. San Jose : Cypress Semiconductor Corporation, 2002.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部