期刊文献+

网络安全评估方法研究进展 被引量:16

Research on Network Security Assessment
原文传递
导出
摘要 随着IT业迅速发展,网络安全也越来越受到重视。一种有效的网络安全评估方法不仅可以发现已有的网络安全漏洞,而且能够找出网络中潜在的漏洞并通过数学方法定位网络中最易受到攻击的节点,从而使企业网络能够在新一轮的网络攻击中存活下来,企业业务得以继续展开。文中总结了各种网络安全的评估方法并对其加以分类,在此基础上对网络安全评估方法的未来发展做了展望。 With the high-speed development of IT industry, network security has attracted much attention. An effective method for network security assessment could not only find the existing flaws, but also discover some potential exploits in the network system. Moreover, this method could locate the node in the network with the highest possiblity of being attacked by means of mathematical tools. Thus the networks at enterprise level could survive a new round of network attack, and the services of enterprises could be continuously carried on. In this article, the methods for network security assessment are classified, and the prospects of network security assessment methods are forecasted.
出处 《信息安全与通信保密》 2009年第10期50-53,共4页 Information Security and Communications Privacy
基金 十一五国防科研基金资助项目(C1420061353)
关键词 网络安全评估 量化评估 规则评估 模型评估 network security assessment quantitative assessment assessment based on rules assessment based on models
  • 相关文献

参考文献5

二级参考文献75

  • 1张涛,胡铭曾,云晓春,李东,孙亮.网络攻击图生成方法研究[J].高技术通讯,2006,16(4):348-352. 被引量:7
  • 2Ritchey R W,Ammann P.Using Model Checking to Analyze Network Vulnerabilities[J].Proceedings of the IEEE Symposium on Security and Privacy,Oakland,CA,2000.
  • 3Kumar V,Srivastava J,Lazarevic A.Managing Cyber Threats:Issues,App roaches and Challenges[M].Kluwer Academic Publishers,2003:247-266.
  • 4[2]Sheyner O,Haines J,Jha S,et al.Automated Generation and Analysis of Attack Graphs[A].Proceedjngs of IEEE Symposium on Security and Privacy[C].2002,2732284.
  • 5[3]NuSMV website,http://nusmv.irst.itc.it/.
  • 6[4]Ammann P,Wijesekera D,Kaushik S.Scalable,Graph based Network Vulnerability Analysis[C].Proc.of the 9th ACM Conference on Computer and Communications Security,2002,217~224.
  • 7[6]Oleg Sheyner.Scenario Graphs and Attack Graphs[D].PhD thesis,CMU,2004.
  • 8[1]Swiler L P,Phillips C,Ellis D,et al.Computer attack graph generation tool[C].In Proceedings of the DARPA Information Survivability Conference and Exposition,June,2000.
  • 9Ortalo R, Deswartc Y, Kaaiche M. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security [R]. LAAS Report 96369, 1997-01
  • 10Dacier M, Deswarte Y, Kaaiche M. Quantitative Assessment of Operational Security: Models and Tools [R]. LAAS Research Report 96493, 1996-05

共引文献154

同被引文献86

引证文献16

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部