期刊文献+

计算机网络脆弱性分析方法初探 被引量:1

Discussion on Vulnerability Analysis Procedures of Computer Network
下载PDF
导出
摘要 为加强计算机网络的安全管理和使用,减少被攻击和失泄密事件的发生,分别从系统自身脆弱性和外在威胁2个方面进行了系统分析,在此基础上提出了脆弱性分析准备、脆弱性识别和脆弱性排序等评估计算机网络脆弱性的方法步骤,提出了静态度量和动态度量2种度量网络脆弱性的方法,并就两2种方法进行了实验解析,为解决计算机网络脆弱性问题提供了一种量化手段。 In order to strengthen the safety management and application of computer network, reduce the occurrence of attacks and loss of leak, this paper performs system analysis for such two aspects as vulnerability and external threat respectively. Based on the analysis, it proposes the procedures of evaluating the vullnerability of computer network from analysis readiness, identification and ordering of vulnerability. The two procedures of measuring network vulnerability are presented, such as static measurement and dynamic measurement. The experiment results show that the two procedures can provide a quantization means for vulnerability analysis of computer network.
作者 洪军
机构地区 [
出处 《计算机与网络》 2013年第12期50-52,共3页 Computer & Network
关键词 脆弱性 安全 策略 IP vulnerability security policy IP
  • 相关文献

参考文献5

二级参考文献13

  • 1[2]Dan Farmer,Wietse Venema.Vulnerabnity Assessment Franwork[J].network security,2006,Vol.45(4),157-161.
  • 2[3]The Vulnerability of Internet Security Systems(ISS)[R].http://www.iss.net/security center/.
  • 3[4]C.R.Ramakrishnan,R.Sekar.Survivability Analysis of Network Specifications[Z].Workshop on Dependability Despite Malicious Faults.June 2005.
  • 4[5]Laura Swiler.A graph based sysetm for network vulnerability analysis[J].network security,2006,Vol.45(6),98-103.
  • 5KPMG Peat Marwick LLP.Vulnerability Assessment Framework 1.1[M]. CIAO publications, 1998.
  • 6Eric Knight.Computer Vulnerabilities[M].2000.
  • 7John R Sciandra.Holistic Vulnerability Assessment Methodologies. http ://www.nacon.com/papers/whitepaper.pdf, 2001.
  • 8Gary Stoneburner,Alice Goguen,Alexis Feringa.NIST Special Publication 800-30:Risk Management Guide for Information Technology System[M].WASHINGTON:U S GOVERNMENT PRINTING OFFICE, 2001.
  • 9ISS.Network and Host-based Vulnerability Assessment:A guide for information systems and network security professionals.http://documents.iss.net/whitepapers/nva.pdf, 2001.
  • 10Char Sample,Symantec and Ianpoynter,Quantifying in The Network Environment:methods and Uses[M].TICS,2000,299.

共引文献31

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部