期刊文献+

基于生命周期理论的安全漏洞时间风险研究 被引量:5

Research on Time Risk of Security Vulnerability Based on Lifecycle Theory
下载PDF
导出
摘要 为合理、科学地识别信息安全风险评估中安全漏洞的真实危害程度,引入安全漏洞生命周期概念,提出安全漏洞的时间风险模型。该模型利用早期报道的攻击事件统计量对安全漏洞进行攻击预测估计,根据结果计算出安全漏洞的攻击热度,结合漏洞攻击技术发展水平对安全漏洞时间维度上的风险进行评估。以Phf漏洞为例进行分析,结果表明,该风险评估模型可以真实、动态地反映出安全漏洞时间风险。 The time risk model is proposed to identify the real damage degree of security vulnerability in information security risk evaluation reasonably and scientifically, combining with vulnerability lifecycle. The subsequent exploitation of the vulnerability is predicted by using Gompertz model based on the incident report data, and attack heat is calculated. Based on the attack heat and the attack technology development, the evaluation can be drawn on the time dimension. An example of Phf vulnerability is given to demonstrate the validity of this method, and the result indicates that it can reflect time risk truly and dynamically.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第1期131-133,136,共4页 Computer Engineering
关键词 安全漏洞 生命周期 攻击热度 时间风险 评估 security vulnerability lifecycle attack heat time risk evaluation
  • 相关文献

参考文献9

  • 1夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:29
  • 2张涛,胡铭曾,李东,郑明.一种量化的软件弱点评估方法[J].计算机工程与应用,2005,41(27):7-9. 被引量:5
  • 3王航,高强,莫毓昌.基于攻击图和安全度量的网络脆弱性评价[J].计算机工程,2010,36(3):128-130. 被引量:11
  • 4Arbaugh W A, Fithen W L, McHugh J. Windows of Vulnerability: A Case Study Analysis[J]. IEEE Computer, 2000, 33(12): 52-59.
  • 5Jumratjaroenvanit A, Teng Yunyong. Probability of Attack Based on System Vulnerability Lifecycle[C]//Proc. of International Symposium on Electronic Commerce and Security. [S. l.]: IEEE Press, 2008:531 - 535.
  • 6Frei S, Tellenbach D, Plattner B. 0-day Patch Exposing Vendors in Security Performance[EB/OL]. (2008-03-27). http://www.tech zoom.net/publications/papers.en.
  • 7Browne H K, Arbaugh W A, McHugh J, et al. A Trend Analysis of Exploitations[C]//Proc. of the IEEE Symposium on Security and Privacy. Oakland, USA: [s. n.], 2001: 214-229.
  • 8李一智.经济预测技术[M].北京:清华大学出版社,1998.
  • 9易平涛,张丹宁,郭亚军,高立群.动态综合评价中的无量纲化方法[J].东北大学学报(自然科学版),2009,30(6):889-892. 被引量:70

二级参考文献49

  • 1边旭,田厚平,郭亚军.具有激励特征的供应商动态评价方法[J].南开管理评论,2004,7(5):87-90. 被引量:24
  • 2易平涛,郭亚军,张丹宁.基于双激励控制线的多阶段信息集结方法[J].预测,2007,26(3):39-43. 被引量:46
  • 3Saaty T L. The analytic hierarchy process[ M]. New York: McGraw-Hill, 1980.
  • 4Hwang C L, Yoon K. Multiple attribute decision making [M]. Berlin: Springer-Verlag, 1981.
  • 5Hwang C L, Lin M J. Group decision making under multiple criteria: methods and applications [ M ]. Berlin: Springer- Verlag, 1987.
  • 6Gregory A J, Jackson M C. Evaluation methodologies: a system of use[J ]. Journal of Operational Research, 1992, 43(1):19-28.
  • 7Smith M F. Evaluation: review of the past, preview of the future[J]. Evaluation Practice, 1994,15(2):215 227.
  • 8Smith M F. Evaluation: preview of the future [J ]. American Journal of Evaluation, 2001,22(3) :281 - 300.
  • 9Phillips C, Swiler L. A Graph-based System for Network Vulnerability Analysis[C]//Proceedings of the New Security Paradigms Workshop. Charlottesville, VA, USA: [s. n.], 1998.
  • 10Swiler L, Phillips C, Ellis D, et al. Computer-attack Graph Generation Tool[C]//Proc. of DISCEX'01. Anaheim, CA, USA: [s. n.], 2001.

共引文献111

同被引文献41

引证文献5

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部