期刊文献+

一种新型网络安全评估方案

下载PDF
导出
摘要 本文采用网络安全评估的数学方法,提出了一种基于漏洞检测技术的网络安全评估方案。本方案由客户端与评估服务器端组成,客户端定制并提交扫描任务,服务器端执行扫描任务,并将结果返回给客户端,客户端以收到的扫描结果为输入,采用合适的算法对目标系统的安全性能进行评估,整个系统架构由扫描配置模块、扫描控制模块、结果输出模块、漏洞库组成。最后通过采用复杂综合评判法来评估系统的脆弱性。
出处 《计算机光盘软件与应用》 2014年第9期139-140,146,共3页 Computer CD Software and Application
  • 相关文献

参考文献3

二级参考文献40

  • 1Lowe G, Roscoe B. Using CSP to detect errors in the TMN protocol)[J]. IEEE Transactions on Software Engineering, 1997, 23(10), 659 -669.
  • 2Robert Thorhuus. Software fault injection testing [J]. Ericsson Telecom, Stockholm, Sweden, 2000,2.
  • 3John D Howard. An analysis of security incident on the internet[D]. Carnegie Mellon University, West Lafayette , USA, 1997.
  • 4Rodolphe Ortalo, Yves Deswarte, Mohamed Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security [R]. LAAS Report 96369, 1997,1.
  • 5Mare Daeier, Yves Deswarte, Mohamed Kaaniehe. Quantitative assessment of operational security: models and tools[R]. LAAS Research Report 96493, 1996, 5.
  • 6Steve Miksell, Scott Nainis W, Henry M James. Security vulnerability assessment tools for internet applications[Z]. White Paper, Information Technology Support Center, 2001,3.
  • 7John D McLean. Security model [J]. Encyclopedia of Software Engineering[M] ,Wiley & Sons. Inc , 1994.
  • 8Saaty T L . How to make a decision:the analytic hierarchy process [J]. European Journal of Operational Research, 1990, 1(48) : 9- 26.
  • 9Shafer G &Logan R. Implementing dempster's rule for hierarchical evidence[J]. Artificial Intelligence, i987,33:271-298.
  • 10Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996

共引文献102

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部