期刊文献+

计算机网络安全性分析建模研究 被引量:41

Research on computer network security analysis model
下载PDF
导出
摘要 安全性分析研究工作需要把计算机网络与安全相关的系统资源和安全因素抽取出来建立一种面向安全性分析的安全模型。从安全需求的类别、等级和面临的主要威胁出发,分析了系统设备、访问权限、主体连接关系和弱点,从攻击者目的是提升特权的角度对攻击作了形式化的描述。针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。 The research of security analysis needed a systemic security analysis model that was from the system resource and security factor of computer network. For the classification, rate and the main threaten of the security requirement, system devices, access privilege, host connection relation and vulnerability were analyzed, and the computer network attack from the point of view that the attacker's objective was to get privilege escalation was described. The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
出处 《通信学报》 EI CSCD 北大核心 2005年第12期100-109,共10页 Journal on Communications
基金 国家自然科学基金资助项目(60403033) 国防十五预研基金资助项目(41315.7.1)
关键词 计算机网络安全 安全模型 弱点 攻击 故障树 攻击图 computer network security security model vulnerability attack fault tree attack graph
  • 相关文献

参考文献21

  • 1CERT/CC.CERT/CC Statistics 1988-2003.http://www.cert.org/stats/ cert_stats.html#vulnerabilities[EB/OL].2004.
  • 2FARMER D,SPAFFORD E H.The Cops Security Checker System[R].Technical Report CSD-TR-993.Department of Computer Sciences,Purdue University.1991.
  • 3NMAP.http://www.insecure.org/nmap/index.html[EB/OL].2003.
  • 4Renaud Deraison.Nessus Scanner.http://www.nessus.org[EB/OL].2004.
  • 5.[EB/OL].ISS.http://www.iss.com/[EB/OL],2004.
  • 6MOORE A P,ELLISON R J,LINGER R C.Attack Modeling for Information Security and Survivability[R].Technical Note,CMU,2001.
  • 7ORTALO R,DESWARTE Y.Experimenting with quantitative evaluation tools for monitoring operational security[J].IEEE Transactions on Software Engineering,1999,25(5):633-650.
  • 8PHILLIPS C A,SWILER L P.A graph-based system for network vulnerability analysis[A].New Security Paradigms Workshop[C].1998.71-79.
  • 9SWILER L P,PHILLIPS C,ELLIS D.Chakerian.Computer-attack graph generation tool[A].Proceedings of the DARPA Information Survivability Conference and Exposition[C].Anaheim,California,2000.307-321.
  • 10RAMAKRISHNAN C,SEKAR R.Model-based analysis of configuration vulnerabilities[J].Journal of Computer Security,2002,10(1/2):189-209.

二级参考文献8

  • 1.GB 17859-1999.计算机信息系统安全保护等级划分准则[S].,1999..
  • 2Fran Nielsen. Approaches to Security Metrics[ R]. Gaithersburg: NIST,2000.
  • 3ACSA and MITRE Corp. Information system security attribution quantification or ordering[ A] .2001 1^st Workshop on Information System Security Scoring and Ranking Proceedings [ C ]. Virginia: ACSA and MITRE Corp, 2001.1 - 70.
  • 4Bennet S Yee. Security metrology and the monty hall problem[EB/OL].http://ww.cs.ucsd.edu/-bsy/pub/metrology.pdt,2001 -04-02.
  • 5DoD 5200.28-STD, Department of Defense Trusted Computer System Evaluation Criteria[S].
  • 6ISO/IEC 15408, Information Technology-Security Techniques-Evaluation Criteria For IT Security[S].
  • 7GB17859—1999.计算机信息系统安全保护等级划分准则[S].[S].,..
  • 8贺龙涛,方滨兴,云晓春,汪立东.利用ARP伪装在交换以太网捕包[J].网络安全技术与应用,2001(1):38-40. 被引量:10

共引文献34

同被引文献176

引证文献41

二级引证文献117

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部