期刊文献+

大规模分布式系统脆弱性分析框架研究 被引量:1

Research on Vulnerability Analysis Framework for Large-scale Distributed System
下载PDF
导出
摘要 随着大规模分布式系统在国家安全、经济运行、基础设施、社会生活等方面扮演的角色越来越重要,其脆弱性分析问题日益成为人们关注的焦点。将大规模分布式系统视为脆弱性分析对象,构建了大规模分布式系统的层次模型,分析了大规模分布式系统的脆弱性类型,提出了基于生命周期的多维度的大规模分布式系统脆弱性分析框架,从脆弱性分析阶段、生命周期以及脆弱性类型等方面系统地梳理了研究方向。 As the large-scale distributed system plays an increasingly important role in such fields of national security,critical infrastructure and social life,its vulnerability analysis has become a growing focus nowadays.Regarding it as a vulnerability analysis object,a multi-layer model for large-scale distributed system was put forward first,and then a multi-dimension vulnerability analysis framework was proposed,which provided an overview of vulnerability analysis research area and method in three aspects,including vulnerability analysis phase,lifecycle process and taxonomy of vulnera-bility.
出处 《计算机科学》 CSCD 北大核心 2012年第6期58-60,共3页 Computer Science
关键词 大规模分布式系统 脆弱性分析 生命周期 LDS Vulnerability analysis Lifecycle process
  • 相关文献

参考文献21

  • 1Tanenbaum A S,Steen Mv.分布式系统原理与范型(第二版)[M].北京:清华大学出版社,2008:1-22.
  • 2CERT. CERT Statistics I-R/OLd. http://www, cert. org/stats/ cert_stats, htrnl, 2009-09-06.
  • 3Andre L N. Attacking P2P Networks[J/OL]. http://ww'wesif. cs. ucdavis, edu/ nash/235/attacking_ p2p_ networks, pdf, 2010-08-24.
  • 4Pretre B. Attacks on Peer-to-Peer Networks[D]. Zurich: Swiss Federal Institute of Technology(ETH),2005.
  • 5Park S-T. Static and Dynamic Analysis of the Internet's Suscep- tibility to Faults and Attacks[-C]//Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, 2003,3 : 2144-2154.
  • 6Srivatsa M, Liu L. Vulnerabilities and Security Threats in Struc- tured Overlay Networks: A Quantitative Analysis l-C]///20thAnnual Computer Security Applications Conference(ACSAC). 2004 : 252-261.
  • 7Engle M, Khan J. Vulnerabilities of P2P Systems and a Critical Look at their Solutions[R]. Kent:Department of Computer Sci- ence, Kent State University, 2006.
  • 8Gymnopoulos L,Dritsas S,Gritza|is S, et aI. GRID Security Re- view [-J. Springer Lecture Notes in Computer Scien-ce, 2003, 2776..100-111.
  • 9Demchenko Y, Gommans L, de Laat C, et al. Web Services and Grid Security Vulnerabilities and Threats Analysis and Model [-C] // Proceedings of the 6th IEEE/ACM International Work- shop on Grid Computing. Washington.. IEEE, 2005:262-267.
  • 10Naqviand S,Riguidel M. Threat Model for Grid Security Ser- vices[-J. Lecture Notes in Computer Science, 2006,3470:1048- 1055.

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部