期刊文献+

一种主机安全评估系统的研究和设计 被引量:1

Research and Design on Host Security Assessment System
下载PDF
导出
摘要 为解决现有主机安全评估系统扫描项不全、知识库不完备、评估结果太笼统等问题,将定性和定量分析用于评估中,提出了一种主机安全评估模型MSA,该模型集成多元安全扫描、综合安全评估知识库、多元数据融合和层次分析结合的评估方法等关键技术,与现有系统比较,该模型扫描项全,知识库完备,评估结果合理. To solve the problem of incompleteness of scan item and not-integrity of host security assessment database and shortage of quantitative security assessment method,this paper brings forward three key technologies which consist of host security multi-scan,synthesize assessment database and assessment model with multi-data fusion technique and AHP(MDFAH).System realizes validate source data completeness of multi-scan and veracity of assessment.
出处 《中原工学院学报》 CAS 2009年第5期24-29,共6页 Journal of Zhongyuan University of Technology
基金 河南省科技攻关计划项目(092102310038 092102210029)
关键词 主机安全评估 多元安全扫描 评估知识库 评估算法 host security assessment multi-scan synthesize assessment database MDFAH
  • 相关文献

参考文献11

  • 1LIN Meng-quan, ZHU Yun,LI Jian-hua. Research on Assessemt Model of Information System Security Based on Various Security Factors[D]. Shanghai: Shanghai Jiaotong University, 2007:262-268.
  • 2Pilz A. Policy-Maker: A Toolkit for Policy-based Security Management[J]. Network Operations and Management, 2004(1): 263-276.
  • 3Marshall D A. Coming to Acceptance of Ways for Measuring and Ranking Security Properties[C]//. Proc. of the 1st Work shop on Information Security System Rating and Ranking. ACSA Press, 2001.
  • 4David M, William H, Kishor S. Model-based Evaluation: from Dependability to Security[J]. IEEE Transactions on Dependarble and Secure Computing, 2004(1): 48- 65.
  • 5LIU Y, Hong M. Network Vulnerability Assessment Using Bayesian Networks[R]. Stevens Institute of technology, 2004.
  • 6Martel S. A New Model for Computer Network Security Risk Analysis[D]. Ottawa, Ontario: Department of Systems and Computer Engineering, Carleton University, 2002.
  • 7Pfleeger C P. Creating and Implementing a Security Strategy[J]. Cutter Consortium, 2001, 4(3) : 15- 17.
  • 8The Symantec Security Response. Threat Severity Assessment[EB/OL]. (2006-12-12). http://www.symantec, com/avcenter/threat. severity. html.
  • 9NIST. National Vulnerability Database[EB/OL]. (2007-08-08). http://nvd.nist. gov/.
  • 10MSTL-JGF-04-0160101-2006.信息安全技术主机安全漏洞扫描产品检验规范[S].

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部