期刊文献+

脆弱性数据库技术研究 被引量:1

Research on Vulnerability Database Technology
下载PDF
导出
摘要 脆弱性是网络安全事件的根源,脆弱性数据库技术有利于系统地分析脆弱性的本质,从而有利于脆弱性的检测、预防和消除。首先总结了脆弱性数据库的四种组织模式;然后提出了设计和管理脆弱性数据库应该解决的问题;介绍了基于脆弱性数据库的分析和应用技术;最后介绍了主流的脆弱性数据库。 Vulnerability is the origin of network incident. Vulnerability database technology is advantageous to systematically analyze the vulnerability essence, thus is advantageous to the vulnerability detection, the prevention and the elimination. First, four vulnerability database modes are summarized, then the issues of design and management vulnerability database are put forward, and the technologies based on vulnerability database analysis and application are introduced, finally, some influential vulnerability databases are introduced.
出处 《计算机应用研究》 CSCD 北大核心 2006年第3期5-7,共3页 Application Research of Computers
基金 国家"863"计划资助项目(2003AA146010)
关键词 脆弱性 数据库 脆弱性数据库 脆弱性扫描 网络安全 Vulnerability Database Vulnerability Database Vulnerability Scan Network Security
  • 相关文献

参考文献11

  • 1CERT/CC.CERT/CC Statistics 1988-2004:Vulnerabilities Reported[EB/OL].http://www.cert.org/stats/cert_stats.html,2005.
  • 2Pascal C Meunier,Eugene H Spafford.Final Report of the 2nd Workshop on Research with Security Vulnerability Databases[R].West Lafayette:Purdue University,1999.
  • 3Ivan Victor Krsul.Software Vulnerability Analysis[D].West Lafayette:Department of Computer Sciences,Purdue University,1998.
  • 4M Schumacher,et al.Data Mining in Vulnerability Databases[R].Darmstadt:Darmstadt University of Technology,2000.
  • 5Ma L,Mandujano S,Song G,et al.Sharing Vulnerability Information Using a Taxonomically-Correct,Web-based Cooperative Database[R].West Lafayette:Purdue University,CERIAS,2001.
  • 6Kanta Jiwnani,et al.Susceptibility Matrix:A New Aid to Software Auditing[J].IEEE Security and Privacy,2004,2(2):16-21.
  • 7Carl E Landwehr,et al.A Taxonomy of Computer Program Security Flaws[J].ACM Computing Surveys,1994,26(3).
  • 8Robert A Martin.Developing on the Net,Dealing with Software Vulnerabilities[R].Bedford:The MITRE Corporation,2001.
  • 9Common Vulnerabilities,Exposures.The Standard for Information Security Vulnerability Names[EB/OL].http://www.cve.mitre.org/cve,2005.
  • 10BugTraq Frequently Asked Questions[EB/OL].http://www.securityfocus.com/popups/forums/bugtraq/faq.shtml,2005.

同被引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部