期刊文献+

计算机网络脆弱性评估方法研究

The Research of Computer Network Vulnerabilities Assessment Methods
下载PDF
导出
摘要 目前,计算机网络技术得到了广泛的应用,但是用户们普遍缺少安全意识和防范手段,使得计算机网络面临着严重的安全危机。基于此,本文分析了计算机网络脆弱性评估的几种方法:主要包括基于模型的评估方法、基于贝叶斯网络的评估方法和基于博弈论的评估方法,这些方法从不同角度对计算机网络的脆弱性进行了测量和评估,但是需要在评估成本和评估的安全代价两者之间找到一个平衡点。 Currently,computer network technology has been widely used,but users generally lack safety awareness and preventive measures,therefore the computer network is facing serious security crisis.Based on this,this paper analyzes several methods of computer network vulnerability assessment,it mainly includes model-based assessment methods,the evaluation method based on Bayesian network and the evaluation method based on game theory. These methods measure and assess the vulnerability of computer networks from different angles,but it needs to find a balance between evaluation costs and evaluation safety consideration.
作者 刘东鹏
出处 《科技资讯》 2014年第4期31-32,共2页 Science & Technology Information
关键词 计算机网络 脆弱性 评估方法 Computer Network Vulnerability Assessment Method
  • 相关文献

参考文献6

  • 1Dewri R, Ray I.Poolsappasit N,et al. Optimal Security Hardening on Attack Tree Models of Networks:A Cost- benefit Analysis[J].International Jour- nal of Information Security,Springer, 2012(1) :224-235.
  • 2Weidl G, Madsen AL. Israelsson S. Ob- ject-Oriented Bayesian Networks for Condition Monitoring,Root Cause Analysis and Decision Support on Op- eration of Complex Continuous Processes [J]. Computers and Chemical Engineering, 2005(29) : 1996-2009.
  • 3Estrada E,Rodri guez-Velazquez JA. Subgraph Centrality in Complex Networks[J]. Phys Rev E, 2005(55).- 56- 103.
  • 4Bobbio A,Portinale L.Miniehino M. Improving the Analysis of Dependable Systems by Mapping Fault Trees into Bayesian Networks[J].Reliability En- gineering and System Safety,2001(3): 24-250.
  • 5吴金宇,金舒原,杨智.基于网络流的攻击图分析方法[J].计算机研究与发展,2011,48(8):1497-1505. 被引量:14
  • 6林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92

二级参考文献72

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2Lippmann R, Ingols K. An annotated review of past papers on attack graphs [R]. Lexington: MIT Lincoln Laboratory, 2005.
  • 3Phillips C, Swiler L. A graph based system for network vulnerability analysis [C] //Proc of the 1998 Workshop on New Security Paradigms. New York: ACM, 1998.
  • 4Swiler L, Phillips C, Ellis D, et al. Computer attack graph generation tool [C] //Proc of the 2nd DARPA Information Survivability Conf &Exposition. Los Alamitos: IEEE Computer Society, 2001: 307-321.
  • 5Ritchey R, Ammann P. Using model checking to analyze network vulnerabilities [C]//Proe of the 2000 IEEE Syrup on Security and Privacy. Los Alamitos: IEEE Computer Society, 2000:156-165.
  • 6Sheyner O, Jha S, Wing J, et al. Automated generation and analysis of attack graphs [C] //Proc of the 2002 IEEE Syrup on Security and Privacy. Los Alamitos: IEEE Computer Society, 2002:273-284.
  • 7Ammann P, Wijesekera D, Kaushik S. Scalable, graph based network vulnerability analysis [C] //Proc of the 9th ACM Conf on Computer and Communications Security. New York: ACM, 2002:217-224.
  • 8Lippmann, R, Ingols K, Scott C, et al. Validating and restoring defense in depth using attack graphs [C]//Proc of the Military Corn Conf. Piscataway, NJ: IEEE., 2006:1-10.
  • 9Ingols K, Lippmann R, Piwowarski K. Practical attack graph generation for network defense [C] //Proc of the 22nd Annual Computer Security Applications Conf. Los Alamitos: IEEE Computer Society, 2006:121-130.
  • 10Qu X, Govindavajhala S, Appel A. MulVal:A logic-based network security analyzer [C] //Proc of the 14th USENIX Security Syrup. New York: ACM, 2005:113-128.

共引文献104

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部