期刊文献+

一种量化的网络安全态势评估方法 被引量:9

a approach for evaluating security situation of network system
下载PDF
导出
摘要 本文根据网络中系统运行信息和系统配置信息,运用故障树模型对网络安全态势进行分层量化评估。经实验证实该评估方法能够较准确的反映网络安全运行态势。 In this paper, a novel approach for evaluating security situation is proposed. In this approach, system tuning information and system configuration information are used. In addition, the fault tree model is also adopted in order to describe the network security situation of a whole enterprise network in different layers such as service level, host level and network level. Experiment resulets show that this mehod can evaluate network security situation precisely
出处 《微计算机信息》 北大核心 2007年第21期62-64,共3页 Control & Automation
关键词 网络安全 态势评估 故障树 Network Security, Situation evaluation, Fault tree
  • 相关文献

参考文献7

  • 1Ortalo R,Deswarte Y,Kaaniche M.Experimenting with quantitative evaluation tools for monitoring operational security[J].IEEE Trans.on Software Engineering,1999,25(5):633 -651.
  • 2D' Ambrosio B,Takikawa M,Upper D,Fitzgerald J,Mahoney S.Security situation assessment and response evaluation.In:DARPA Information Survivability Conf.& Exposition Ⅱ[J].Anaheirn,2001,387 -394.
  • 3Pullum.Fault tree models for the analysis of complex computerbased systems[J].22-25 Jan.1996 Page(s):200-207.
  • 4沈久军,张红旗.基于主机的攻击受损度模糊综合评估模型[J].微计算机信息,2006,22(04X):40-42. 被引量:2
  • 5陈秀真,郑庆华,管晓宏,林晨光.网络化系统安全态势评估的研究[J].西安交通大学学报,2004,38(4):404-408. 被引量:72
  • 6陈秀真,郑庆华,管晓宏,冯力.基于模糊信息融合的漏洞评估方法[J].小型微型计算机系统,2004,25(8):1424-1427. 被引量:5
  • 7The MITRE Corporation About CVE Common Vulnerabilities and Exposures[EB/OL].http://www.cve.mitre.org/about/.

二级参考文献21

  • 1詹晓庄,尹浩,张霞.基于移动IPv6/IPsec的虚拟专网模型设计[J].微计算机信息,2006,22(03X):102-104. 被引量:4
  • 2[1]Tim B. Multisensor data fusion for next generation distributed intrusion detection systems[A]. 1999 IRIS National Symposium on Sensor and Data Fusion, Laurel,USA,1999.
  • 3[2]Tim B. Intrusion systems and multisensor data fusion: creating cyberspace situational awareness[J]. Communications of the ACM, 2000, 43(4): 99~105.
  • 4[3]Martin R, Chris G.Snort users manual, Snort release 2.0.0[EB/OL].http://www.snort.org/docs/SnortUsersManual.pdf,2002-07-06.
  • 5[4]Tim B, Roger R. Defense-in-depth revisited:qualitative risk analysis methodology for complex network-centric operations[EB/OL].http://www.silkroad.com/papers/pdf/archives/defense-in-depth-revisited-original.pdf,2002-07-23.
  • 6[5]Honeynet Project.Know your enemy: statistics[EB/OL].http://www.HoneyNet.org/papers/stats/, 2001-07-22.
  • 7[5]CERT/CC Vulnerability Note Field Descriptions [EB/OL]. http://www. kb. cert. org/vuls/html/fieldhelp # metric, 2002, 3, 20.
  • 8[6]Security Service[EB/OL]. http://www. chinanetcenter. com/cn/ product ch/product_ch5 safe1-2. htm # 2,2002,5,20.
  • 9[7]Security assessment product [EB/OL]. http://bj. is-one. net/prodlist2. dhtml? id=4,2002,3,20.
  • 10[8]Mahesh V. Tripunitara, Partha Dutta and Gene Spafford. Security assessment of IP-based networks: a holistic approach [EB/ OL]. http://www. cerias. purdue. edu/coast/papers/99-02. pdf, 2002, 1, 19.

共引文献74

同被引文献48

引证文献9

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部