期刊文献+

主流操作系统安全弱点的综合量化评估

Integrated quantitative assessment of mainstream operating systems' security vulnerabilities
下载PDF
导出
摘要 在前期研究工作的基础上,将基于指数的微观分析和基于风险和的宏观分析相结合,提出了一种综合量化评估主流操作系统安全弱点的方法,并对Windows NT、Redhat Linux和Solaris等3大主流操作系统6个版本的1081个弱点实施了评估。该方法能够有效地分析各操作系统版本的演进对其安全性的影响,以及横向比较操作系统在不同层次、不同方面的安全状况。 On the basis of the previous research work, this paper combines the index-based micro-analysis with the risk sum based macro-analysis to propose an integrated method for quantitative assessment of mainstream operating systems' security vulnerabilities, and evaluates 1081 vulnerabilities related to six versions of three mainstream operating systems Windows NT, RedHat Linux and Solaris. This method can be used to effectively analyze the influences of the evolution of the operating systems on their security and compare the security status of the systems from various aspects on various levels.
出处 《高技术通讯》 CAS CSCD 北大核心 2007年第4期331-336,共6页 Chinese High Technology Letters
基金 国家自然科学基金(60403033)、863计划(2001AA147010B)和国防十五预研(4131571)资助项目.
关键词 系统安全 弱点评估 量化评估 弱点关联 操作系统 system security, vulnerability assessment, quantitative evaluation, vulnerability correlation, operating system
  • 相关文献

参考文献10

  • 1Michener J.System insecurity in the Internet age.IEEE Software,1999,16(4):62-69.
  • 2Bishop M.Vulnerabilities analysis.In:Proceedings of the Second International Symposium on Recent Advances in Intrusion Detection,Purdue University,US,1999.125-136.
  • 3Zhang Y Z,Fang B X,Chi Y,et al.Assessment of windows system security using vulnerability relationship graph.In:Proceedings of 2005 International Conference on Computational Intelligence and Security.LNAI 3802,Springer Verlag.Xi'an,China,2005.415-420.
  • 4Bhargava B,Lilien L.Vulnerabilities and threats in distributed systems.In:Proceedings of International Conference on Distributed Computing & Internet Technology,Bhubaneswar,India,2004.146-157.
  • 5Jiwnani K,Zelkowitz M.Maintaining software with a security perspective.In:Proceedings of International Conference on Software Maintenance,Montréal,2002.194-203.
  • 6Kamara S,Fahmy S,Schultz E,et al.Analysis of vulnerabilities in internet firewalls.Computers & Security,2003,22(3):214-232.
  • 7Hedbom H,Lindskog S,Axelsson S,et al.A comparison of the security of Windows NT and UNIX.In:Proceedings of Third Nordic Workshop on Secure IT Systems,Trondheim,Norway,1998.Available Online at http://citeseer.ist.psu.edu/hedbom98comparison.html.
  • 8张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 9Zhang Y Z,Yun X C,Fang B X,et al.A mining method for computer vulnerability correlation.International Journal of Innovative Computing,Information and Control,2005,1(1):43-51.
  • 10SecurityFocus.Bugtraq Vulnerability Database,Available online at http://www.securityfocus.com/bid/.2005.

二级参考文献9

  • 1汪立东.[D].哈尔滨工业大学,2002.
  • 2ASLAM T, KRSUL I, SPAFFORD E H. Use of a taxonomy of security faults[A]. The 19th National Information System Security Conference [C]. Baltimore, Maryland, 1996. 22-25.
  • 3KRSUL I V. Software Vulnerability Analysis[D]. Purdue University, West Lafayette, USA, 1998.
  • 4BISHOP M, BAILEY D. A Critical Analysis of Vulnerability Taxonomies[R]. Technical Report CSE-96-11, Department of Computer Science, University of California, Davis, 1996.
  • 5KNIGHT E, HARTLEY B V. Is your network inviting an attack[J]. Internet Security Advisor, 2000(5/6): 2-5.
  • 6JIWNANI K, ZELKOWITZ M. Maintaining software with a security perspective[A]. ICSM'02[C]. Montréal, 2002. 194-203.
  • 7GLASS R L, VESSEY I. Contemporary application-domain taxonomies[J]. IEEE Software, 1995, 12 (4): 63-76.
  • 8LONGSTAFF T. Update: CERT/CC vulnerability knowledgebase[A]. Technical Presentation at a DARPA Workshop[C]. Savannah, Georgia, 1997.
  • 9单国栋,戴英侠,王航.计算机漏洞分类研究[J].计算机工程,2002,28(10):3-6. 被引量:58

共引文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部