期刊文献+

网络主机脆弱性分析

Analysis of Network Host Vulnerability
下载PDF
导出
摘要 本文提出了一种基于Agent的网络主机脆弱性分析框架,通过分布在各主机中的Agent对网络主机脆弱性度量进行收集,然后分析在不同网络攻击阶段的脆弱性度量值变化状况。通过该脆弱性评估框架,不仅分析了网络主机的脆弱性状况、模拟了网络攻击过程,而且为进一步的网络安全防范奠定了基础。 The thesis presents a framework of network vulnerability analysis based on agents, which gather the vulnerability metric of each host. Then, through analyzing the changes of vulnerability metric in various phases of network attacks, not only are the network vulnerability and the process of network attacks analyzed, but also the way for the prevenlion of network security for further research paved.
出处 《计算机工程与科学》 CSCD 2006年第12期12-14,18,共4页 Computer Engineering & Science
关键词 脆弱性 脆弱性度量 网络攻击 vulnerability vulnerability metric network attack
  • 相关文献

参考文献10

  • 1Scott Evans,Stephen F Bush,John Hershey.Information Assurance Through Kolmogorov Complexity[A].DARPA Information Survivability Conf and Exposition II (DISCEX-II 2001)[C].2001.
  • 2Stephen F Bush.Network Vulnerability Analysis Tool Precis[Z].General Electric Corporate Research and Development Center,1999.
  • 3陆余良,夏阳.主机安全量化融合模型研究[J].计算机学报,2005,28(5):914-920. 被引量:28
  • 4夏阳,陆余良,蒋凡.网络安全量化评估系统的研究与应用[J].计算机科学,2003,30(2):100-104. 被引量:7
  • 5Tom Shake,B Hazzard,D Marquis.Assessing Network Infrastructure Vulnerabilities to Physical Layer Attacks[A].22nd National Information Systems Security Conf[C].1999.
  • 6Bruce Schneier.Attack Trees[J].Doctor Dobbs Journal,1999,24:21-22.
  • 7C R Ramakrishnan,R Sekar.Model-Based Vulnerability Analysis of Computer Systems[A].2nd Int'l Workshop on Verification[C].1998.189-209.
  • 8Paul Ammann,Duminda Wijesekera,Saket Kaushik.Scalable,Graph-Based Network Vulnerability Analysis[A].ACM Conf on Computer and Communications Security[C].2002.217-224.
  • 9Ivan Krsul,Eugene Spafford,Mahesh Tripunitara.Computer Vulnerability Analysis[Z].COAST Laboratory.1998.
  • 10Niklas Borselius.Multi-agent System Security for Mobile Communication:[Ph D Thesis][D].University of London,2003.

二级参考文献13

  • 1[1]Thorhdus R. Software fault injection testing:[master thesis]. Ericsson Telecom, Stockholm, Sweden, 2000
  • 2[2]Sample C, et al. Quantifying Vulnerabilities In The Networked Environment :Methods and Uses. TISC,2000
  • 3[3]Shake T,Hazzard B,Marquis D. Assessing Network Infrastructure Vulnerabilities to Physical Layer Attacks. MIT Lincoln Laboratory. In: 22nd National Information Systems Security Conf.1999
  • 4[4]Ortalo R,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. LAAS Report 96369,1997
  • 5[5]Dacier M,et al. Quantitative Assessment of Operational Security:Models and Tools. LAAS Research Report 96493,1996
  • 6[6]Shafer L R. Implementing Dempster's rule for hierarchical evidence. Artificial Intelligence, 1987,33: 271~298
  • 7[7]Saaty T L . How to make a decision:the analytic hierarchy process. European Journal of Operational Research, 1990,1 (48): 9~26
  • 8[8]Barker R,Kelly G. The Vulnerability Instantiation Methodology prototype. Information Security technical Report, 1998,13: 79 ~86
  • 9Ortalo R., Deswarte Y., Kaaniche M.. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 1999, 25(5): 633~650
  • 10Thorhuus R.. Software fault injection testing[M.S. dissertation]. Ericsson Telecom, Stockholm Sweden, 2000

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部