期刊文献+

一种基于漏洞威胁模型的安全分析技术

A Technology of Analyzing Security Based on Vulnerability Threats Model
下载PDF
导出
摘要 如何全面、准确地分析网站面临的最大威胁成为专业信息安全公司和网站管理员的不可回避的难题。借鉴攻击图的基本思想设计漏洞威胁测试模型(VTTM),并以SQL注入漏洞为例对其进行建模,并利用两种算法分别计算网站的最大威胁值及最优测试序列。 It' s quite a difficult problem for information security companies and web administrators to find a way to analyze the biggest threat to a website entirely and accurately. Having designed Vulnerability Threats Testing Model (VTTM) which is based on the basis of attack graph, taking SQL injection for example to construct its model and introducing two algorisms to calculate the biggest threat value and the best testing sequence respectively.
出处 《计算机与数字工程》 2008年第6期120-122,135,共4页 Computer & Digital Engineering
关键词 渗透测试 攻击图 SQL注入 贪婪算法 动态规划 penetration test, attack graph, SQL injection, greedy algorism, dynamic programming
  • 相关文献

参考文献6

  • 1Laura Painton Swiler, Cynthia Phillips, Timothy Gaylor. A Graph- Based Network-Vulnerability Analysis System [ R]. Sandia National Laboratories, 1998:8 - 13
  • 2Joel Scambray, Mike Shema, Caleb Sima. Hacking Exposed Web Applications, Second Edition[M]. 2006
  • 3William G.J. Halfond, Jeremy Viegas, Alessandro Orso. A Classification of SQL Injection Attacksand Countermeasures [ J ]. College of Computing Georgia Institute of Technology, 2006
  • 4Chris Anley. Advanced SQL Injection In SQL Server Applications[J]. NGSSoflware Insight Security Research ,2002
  • 5SQL Injection, Are Your Web Applications Vulnerable. SPI Dynamics[DB/OL]. http ://www. securitydoes, corn/ library/2656
  • 6许治昆,王伟,郭添森等.网络渗透技术[M].电子工业出版社,2006:650-652

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部