期刊文献+

脆弱性分类技术综述 被引量:3

Survey of Vulnerability Taxonomy Technology
下载PDF
导出
摘要 脆弱性是网络安全事件的根源.要全面分析脆弱性就必须研究脆弱性分类技术,因为分类是系统研究的基础.首先介绍了十九种主要分类方案;然后分析了每个方案的背景、目的、贡献和不足,并对各方案进行了对比分析,总结了现有分类方案的特点;最后提出了一个理想的分类标准. Vuinerability is the origin of network incident. It is need to research vulnerability taxonomy technology for the purpose of analyzing vulnerabilities completely, because the taxonomy is the foundation of system research. First, 19 principal taxonomy schemes were introduced; then the background, aim, achievement and limitation in every scheme were presented, and all schemes are compared and analyzed, and the characteristics of existing taxonomy schemes are summarized; Finally, a ideal taxonomy criterion is put forward.
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第4期627-633,共7页 Journal of Chinese Computer Systems
基金 国家"八六三"高技术研究发展计划基金项目(2003AA146010)资助
关键词 脆弱性 分类 分类学 操作系统 安全 vulnerability classification taxonomy operating system security
  • 相关文献

参考文献15

  • 1Frank Piessens.A taxonomy of causes of software vulnerabilities in internet software[C].Supplementary Proceedings of the 13th International Symposium on Software Reliability Engineering,2002,47-52.
  • 2Landwehr C E,Bull A R,McDermott J P,et al.A taxonomy of computer program security flaws[J].ACM Computing Surveys,September 1994,26(3).
  • 3Aslam T.A taxonomy of security faults in the unix operating system[D].Department of Computer Sciences,Purdue University,1995.
  • 4Matt Bishop.A taxonomy of UNIX system and network vulnerabilities[R].Technical Report 95-10,Department of Computer Science University of California at Davis,CA,May 1995.
  • 5Demillo R A,Mathur A P.A grammar based fault classification scheme and its application to the classification of the errors of TEX[R].Technical Report SERC-TR-165-P,Purdue University,1995.
  • 6Dodson J.Specification and classification of generic security flaws for the tester's assistant library[D].University of California at Davis,1996.
  • 7Ivan Krsul.Computer vulnerability analysis[D].Department of Computer Sciences,Purdue University,1997.
  • 8Cohen F.Information system attacks:a preliminary classification scheme[J].Computers & Security,1997,16(2):94-114.
  • 9Howard J D.An analysis of security incidents on the internet:1989-1995[D].Carnegie Mellon University,1997.
  • 10Ivan Victor Krsul.Software vulnerability analysis[D].Department of Computer Sciences,Purdue University,1998.

同被引文献11

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部