摘要
脆弱性是网络安全事件的根源,脆弱性数据库技术有利于系统地分析脆弱性的本质,从而有利于脆弱性的检测、预防和消除。首先总结了脆弱性数据库的四种组织模式;然后提出了设计和管理脆弱性数据库应该解决的问题;介绍了基于脆弱性数据库的分析和应用技术;最后介绍了主流的脆弱性数据库。
Vulnerability is the origin of network incident. Vulnerability database technology is advantageous to systematically analyze the vulnerability essence, thus is advantageous to the vulnerability detection, the prevention and the elimination. First, four vulnerability database modes are summarized, then the issues of design and management vulnerability database are put forward, and the technologies based on vulnerability database analysis and application are introduced, finally, some influential vulnerability databases are introduced.
出处
《计算机应用研究》
CSCD
北大核心
2006年第3期5-7,共3页
Application Research of Computers
基金
国家"863"计划资助项目(2003AA146010)
关键词
脆弱性
数据库
脆弱性数据库
脆弱性扫描
网络安全
Vulnerability
Database
Vulnerability Database
Vulnerability Scan
Network Security