期刊文献+

网络攻防实验技术的研究 被引量:3

Research on network offense and defense experimental technique
下载PDF
导出
摘要 计算机网络入侵会给系统带来灾难性的后果,为了降低网络入侵带来的风险,可以运用网络攻防实验来模拟网络入侵。阐述了攻防实验是对系统风险评估的有效手段,是信息安全技术的重要组成部分。攻防实验在刚起步的时候仅仅是对信息安全技术的有效提升,而之后它的重要性会逐渐增加并开始成为信息系统风险评估的重要技术补充。重点从技术的角度叙述了攻防实验的主要方法,从而使攻防实验井然有序地进行。 Computer network intrusion would bright disastrous consequences to system. In order to reduce the risk of network intrusion, the network offense and defense experiment can be used to simulate network assessment intrusion. Offense and defense experiment is effective for system risk assessment and it is an important component of information safety technology. Offense and defense experiment was just effective upgrade of information safety technology at the beginning, and then its importance gradually increase and became importance complement of information technology risk assessment. This paper focuses on the primary means from technique, so that offense and defense experiment is able to carry out in an orderly manner.
出处 《信息技术》 2010年第1期125-126,129,共3页 Information Technology
关键词 攻防实验技术 风险评估 信息安全 offense and defense experiment risk assessment information security
  • 相关文献

参考文献4

二级参考文献13

  • 1诸葛建伟,徐辉,潘爱民.基于面向对象方法的攻击知识模型[J].计算机研究与发展,2004,41(7):1110-1116. 被引量:7
  • 2吕维梅,刘坚.C/C++程序安全漏洞的分类与分析[J].计算机工程与应用,2005,41(5):123-125. 被引量:18
  • 3诸葛建伟,叶志远,邹维.攻击技术分类研究[J].计算机工程,2005,31(21):121-123. 被引量:23
  • 4Amoroso E G. Fundamentals of Computer Security Technology.Englewood Cliffs(New Jersey): Prentice Hail, 1994.
  • 5Lindqvist U, Jonsson E. How to Systematically Classify Computer Security Intrusions. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press,1997:154-163.
  • 6Kendall K. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems[Master Thesis]. Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1999.
  • 7One A. Smashing the Stack for Fun and Profit. Phrack Magazine, 1996,7(49).
  • 8Spyrit D, Jack A B. Win32 Buffer Overflows (Location, Exploitation and Prevention). Phrack Magazine, 2000, 55(I5).
  • 9单国栋,戴英侠,王航.计算机漏洞分类研究[J].计算机工程,2002,28(10):3-6. 被引量:58
  • 10段海新.计算机网络安全的应急响应[J].电信技术,2002(12):10-13. 被引量:12

共引文献36

同被引文献8

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部