摘要
脆弱性是网络安全事件的根源.要全面分析脆弱性就必须研究脆弱性分类技术,因为分类是系统研究的基础.首先介绍了十九种主要分类方案;然后分析了每个方案的背景、目的、贡献和不足,并对各方案进行了对比分析,总结了现有分类方案的特点;最后提出了一个理想的分类标准.
Vuinerability is the origin of network incident. It is need to research vulnerability taxonomy technology for the purpose of analyzing vulnerabilities completely, because the taxonomy is the foundation of system research. First, 19 principal taxonomy schemes were introduced; then the background, aim, achievement and limitation in every scheme were presented, and all schemes are compared and analyzed, and the characteristics of existing taxonomy schemes are summarized; Finally, a ideal taxonomy criterion is put forward.
出处
《小型微型计算机系统》
CSCD
北大核心
2006年第4期627-633,共7页
Journal of Chinese Computer Systems
基金
国家"八六三"高技术研究发展计划基金项目(2003AA146010)资助
关键词
脆弱性
分类
分类学
操作系统
安全
vulnerability
classification
taxonomy
operating system
security