期刊文献+

网络脆弱性分析方法的研究 被引量:2

Research on Analysis Methods of Network Vulnerability
下载PDF
导出
摘要 网络脆弱性分析是网络安全分析和风险评估的重要组成部分。网络脆弱性分析方法的发展经历了从人工分析到自动分析的阶段,在自动化分析阶段,基于网络扫描的脆弱性分析发展得到了很大的进步。为了方便网络脆弱性的分析,提出了基于模型的分析方法,提出的各种基于模型的脆弱性分析方法从不同的角度入手,具有各自的优势。为了全面、准确地分析目标网络,必须考虑整个系统作为一个动态和分布式的特点,基于模型的分析方法可以分析整个网络,并可以利用强大的数学工具。 Vulnerability analysis of network is an important part of network security analysis and risk assessment. Vulnerability analysis of network has experienced the stage from the manual to the automatic. In the automatic analysis stage, the scan-based vulnerability analysis methods have been well advanced. In order to be convenient for vulnerability analysis of network,the model-based analysis has been proposed. Many model-based vulnerability analysis methods start with different angles and have respective advantages. To make the result comprehensive and accurate,the target of analysis must be considered as a whole system with dynamic and distributed features. Model- based methods can analyse a whole network, and can use powerful mathematic tools.
出处 《计算机技术与发展》 2013年第4期126-130,共5页 Computer Technology and Development
基金 国防973项目(6131180401)
关键词 网络安全分析 脆弱性 PETRI网 network security analysis vulnerability Petri nets
  • 相关文献

参考文献15

  • 1Bishop M, Bailey D. A critical analysis of vulnerability taxono- mies [ R ]. Davis : University of California at Davis, 1996.
  • 2刘海燕,杨洪路,王崛.一个基于网络的脆弱性扫描系统[J].计算机应用,2003,23(7):98-99. 被引量:4
  • 3林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 4Noel S,Jacobs S,Jacobs M. Efficient Minimum-cost Network Hardening via Exploit Dependency Graphs[ C]//Proc of the 19th Annual Computer Security Applications Conference. Las Vegas,Nevada: [ s. n. ] ,2003:86-95.
  • 5Ilgun K. USTAT: A real-time intrusion detection system for UNIX [ C ]//Proc of IEEE Symposium on Research in Security and Privacy. Oakland, CA : [ s. n. ], 1993.
  • 6Swiler L P,Phillips C, Gaylor T. A graph-based network-vul- nerability analysis system [ R ]. Sandia: Sandia National Labo-ratories, 1997.
  • 7Li W. An Approach to Graph-based Modeling of Network Ex- ploitations [ D ]. Mississippi State : Mississippi State University, 2005.
  • 8Noel S,Jajodia S,Berry B,et al. Effcient Minimum-cost Net- work Hardening via Exploit Dependency Graphs [ C ]//Pro- ceedings of the 19th Annual Computer Security Applications Conference. Las Vegas, Nevada : [ s. n. ] ,2003 : 1 - 10.
  • 9张维明,毛捍东,陈锋.一种基于图论的网络安全分析方法研究[J].国防科技大学学报,2008,30(2):97-101. 被引量:9
  • 10Liu Yu, Man Hong. Network Vulnerability Assessment Using Bayesian Networks[ C]//The International Society for Optical Engineering. San Diego, CA : SPIE Press, 2005:61-71.

二级参考文献133

共引文献236

同被引文献27

  • 1汪生,孙乐昌.网络攻击效果评估系统的研究与实现——基于指标体系[J].计算机工程与应用,2005,41(34):149-153. 被引量:20
  • 2冯萍慧,连一峰,戴英侠,李闻,张颖君.面向网络系统的脆弱性利用成本估算模型[J].计算机学报,2006,29(8):1375-1382. 被引量:28
  • 3张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 4张庭.电子政务外网网络结构与安全管理[D].南京:南京邮电大学,2012.
  • 5GB/Z24294-2009.基于互联网电子政务信息安全实施指南[S/OL].[2010-02-01].http://wenku.baidu.com/view/6f442635f111 f18583d05afa.html.
  • 6CONTE D,FOGGIA P,SANSONE C,et al.Thirty years of graph matching in pattern recognition[J].International Journal of Pattern Recognition and Artificial Intelligence,2004,18(3):265-298.
  • 7KOLLIAS G,SATHE M,SCHENK O,et al.Fast parallel algorithms for graph similarity and matching[J].Journal of Parallel and Distributed Computing,2012,3(1):1161-1172.
  • 8ULLMANN J R.An algorithm for subgraph isomorphism[J].Journal of the ACM,1976,23(1):31-42.
  • 9LIANG Z,XU M,TENG M,et al.Comparison of protein interaction networks reveals species conservation and divergence[J].BMC Bioinformatics,2006,7(1):457-472.
  • 10TIAN W,SAMATOVA N F.Pairwise alignment of interaction networks by fast identification of maximal conserved patterns[J].Pacific Symposium on Biocomputing,2009,14:99-110.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部