期刊文献+

电力企业网的安全漏洞状况及划分 被引量:2

The division of security vulnerability state in electric power enterprise network
下载PDF
导出
摘要 在利用安全漏洞扫描工具对计算机系统进行扫描时,能够发现大量的安全漏洞,但是目前对漏洞严重性的划分没有和应用环境相结合,划分的也不够细致。分析了一个电力企业网内部安全漏洞的状况,提出了与应用环境相结合的漏洞严重性的划分方法。该方法使漏洞严重性划分得更加细致,从而使系统安全管理员可以在最短的时间内修补更严重的安全漏洞。 Security vulnerability scanning tools can find a large number of vulnerabilities in computer system, but the division of the severity of vulnerabilties has no relation with the application environment. This paper analyses the vulnerabilitiy state in electric power enterprise network and gives a method of division of severity of vulnerability, combining with the application environment. This method divides the vulnerability in detail, and helps system security administrators patch the vulnerabilities in the shortest time.
出处 《贵州师范大学学报(自然科学版)》 CAS 2006年第3期99-101,共3页 Journal of Guizhou Normal University:Natural Sciences
关键词 电力企业网 满洞 应用环境 electric power enterprise network security vulnerabilities application environment
  • 相关文献

参考文献6

  • 1Bishop M. Vulnerabilities analysis [J-OL]. In Proceedings of the 2nd International Workshop on Recent Advances in Intrusion Detection (RAID' 99), 1999. http://www. mid-symposium. org/raid99
  • 2C. Landwehr, A. Bull, J. McDermott, W. Choi. A Taxonomy of Computer Program Security Flaws, with Examples, [J]. ACM Computing Surveys, 1994,26(3): 211-254.
  • 3邢栩嘉,林闯,蒋屹新.计算机系统脆弱性评估研究[J].计算机学报,2004,27(1):1-11. 被引量:84
  • 4Robby Fussell . Vulnerability assessment:network based versus host based [EB/OL]. www. giac. org/practical/GSEC/Robby_Fussell_GSEC. pdf, 2004.
  • 5About CVE. [EB/OL]. http://www, cve. mitre, org/about, 2004.
  • 6Bugtraq List. [EB/OL] http://www. securityfocus.com,2004.

二级参考文献31

  • 1Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996
  • 2Longley D. , Shain M. , Caelli W.. Information Security: Dictionary of Concepts, Standards and Terms. New York: Macmillan, 1992
  • 3Beizer B.. Software Testing Techniques. 2nd edition. International Thomson Computer Press, 1990
  • 4Farmer D. , Spafford E. H.. The COPS security checker system. Purdue University, West Lafayette: Technical Report,Coast TR 94-01, CSD-TR-993, 1990
  • 5Baldwin R. W.. Kuang: Rule-based security checking. Programming Systems Research Group, Lab for Computer Science, MIT, Massachusetts: Technical Report, 1994
  • 6Zerkle D. , Levitt K. , NetKuang: A multi-host configuration vulnerability checker. In: Proceedings of the 6th USENIX Security Symposium, San Jose, CA, 1996
  • 7Porras P. A. , Kemmerer R. A.. Penetration state transition analysis: A rule-based intrusion detection approach. In: Proceedings of the Eighth Annual Computer Security Applications Conference, 1992, 220~229
  • 8Ilgun K.. USTAT: A real-time intrusion detection system for UNIX. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 16
  • 9Jensen K.. Colored petri nets: Basic concepts, analysis methods and practical use. vol. 1. 2nd edition. Berlin, Germany:Springer-Verlag, 1997
  • 10Kumar S.. Classification and detection of computer Intrusions [Ph. D. dissertation]. Department of Computer Science, Purdue University,West Lafayette, 1995

共引文献83

同被引文献6

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部