摘要
该文探讨了一种基于规则库的脆弱性评估方法,其中扫描技术和仿真攻击技术是规则评估方法的关键,文中列出的现有的评估标准为网络评估提供了参考。
The paper introduces one assessment method that based on the regular database of vulnerability, Scanning technology and the simulation attack technology are key of regular vulnerability assessment, The standards of assessment which mentioned in this paper provide reference for vulnerability assessment.
出处
《计算机安全》
2007年第9期28-30,共3页
Network & Computer Security
关键词
网络安全
脆弱性评估
网络扫描
插件技术
network security
vulnerability assessment
network scanning
plugin technique