期刊文献+

安全脆弱点描述语言 被引量:4

A Vulnerability Description Language
下载PDF
导出
摘要 在入侵检测技术的研究中,安全脆弱点的描述是一个急需解决的问题。目前,脆弱点描述方法基本上局限于枚举、CVE两种,但它们在各种安全工具及脆弱点信息源之间进行协同工作方面存在很多困难。为了解决这些问题,文章设计了一种安全脆弱点描述语言。使用该语言描述脆弱点,可以解决脆弱点标识符混乱问题;方便脆弱点的定位、归类与对比;清楚、明确地描述脆弱点内容;有效管理脆弱点的扩展部分及其更新过程。 In the process of studying intrusion detection technology,the vulnerability description is an urgent problem.At present ,the only two popular vulnerability description methods are enumeration and CVE.However,there are many diffi-culties when using these methods to achieve interoperability between all security tools and vulnerability information sources.To solve these problems ,this paper designs a vulnerability description language(VDL).Using VDL to describe vulnerabilities can solve vulnerability identifiers confusion,help to lo cate,classify and compare vulnerabilities,clearly and precisely describe vulnerabilities and effectively manage the extensions of vulnerabilities and their updating processes.
作者 李昀 李伟华
出处 《计算机工程与应用》 CSCD 北大核心 2002年第12期10-11,32,共3页 Computer Engineering and Applications
基金 国家863高技术研究发展计划项目资助(编号:2001AA142100) 国家教育部博士学科点基金资助(编号:20010699018)
关键词 脆弱点描述语言 入侵检测 网络安全 计算机网络 Vulnerability,Vulnerability description language,Enumeration,Common Vulnerabilities and Exposures(CVE),Vulnerability description method
  • 相关文献

参考文献6

  • 1[1]The ICAT team. ICAT Comprehensive Vulnerability Ranking System.http://icat.nist.org
  • 2[2]Mann D E,Christey S M.Towards a Common Enumeration of Vulnerabilities[C].In:Presented at 2nd Workshop on Research with Security Vulnerability Databases,Purdue University,West Lafayette, IN ,1999
  • 3[3]Baker D W,Christey S M,Hill W H et al.The Development of a Common Enumeration of Vulnerabilities and Exposures[C].In:the Second International Workshop on Recent Advances in Intrusion Detection, 1999
  • 4[4]Elz R,Bush R.Clarifications to the DNS Specification[S].RFC 2181,1997-07
  • 5[5]Mockapetris P.Domain names-concepts and facilities[S].RFC 1034,1987-11
  • 6[6]Mockapetris P.Domain names-implementation and specification[S].RFC 1035,1987-11

同被引文献37

  • 1张永铮,方滨兴,迟悦.计算机弱点数据库综述与评价[J].计算机科学,2006,33(8):19-21. 被引量:8
  • 2杨阔朝,蒋凡.安全漏洞的统一描述研究[J].计算机工程与科学,2006,28(10):11-12. 被引量:3
  • 3李晓辉 张西红 谢辉.战术网络端口扫描与漏洞的研究及实现[A]..武汉:中国计算机学会第12届网络与数据通信学术会议[C].,2002..
  • 4OWASP Top 10 for 2010[ EB/OL]. http://www, owasp, org/in- dex. php/Category: OWASP Top_Ten_Project,2010.
  • 5Dafydd Stuttard, Marcus Pinto. The Web application hacker's handbook: discovering and exploiting security flaws [ M]. Wiley Publishing ,2007.
  • 6CVE: common vulnerabilities and exposures [ EB/OL ]. http :// www. eve. mitre, org/, 2009.
  • 7CNVD: China information security vulnerability database [ EB/ OL]. http://www, cnvd. org. cn, 2009.
  • 8Sift Hui-zhong, Chen Bo, Yu Ling. Analysis of Web security com- prehensive evaluation tools [ A]. Proceedings of 2010 International Confvrcnc.~ on Networks Security, Wirvless Communications and Trusted Computing[ C]. IEEE CPS, Wuhan, China, 2010:285- 289.
  • 9Application vulnerability description language v1. 0 [ EB/OL]. ht- tp ://www. oasis-open, org/specs/, 2004.
  • 10An introduction to the oval language,V5. 0 [ EB/OL]. http://o- val. mitre, org/oval/about/documents, html,2010.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部