期刊文献+

基于攻击目的的软件攻击分类方法研究 被引量:5

RESEARCH ON ATTACK PURPOSE-BASED SOFTWARE ATTACK CLASSIFICATION METHOD
下载PDF
导出
摘要 针对目前软件攻击方法复杂多变、层出不穷,软件攻击分类散乱、不成体系的问题,通过研究和分析软件攻击方法,提出基于攻击目的的软件攻击分类框架,并对其进行评价,力图为解决软件攻击分类这一科学问题提供思路,为建立攻击知识模型奠定基础,并为以安全检测或安全性评测为目的的研究人员提供清晰的攻击思路,为构建用于安全保护的软件攻击体系打下理论基础。 Aiming at the problems that at present the software attack technologies are complex and changeable and come out one after another, and the attacks classification appears to be scattered and fragmented, we put forward the attack purpose-based software attack classification framework by studying and analysing software attack technologies, and give the evaluation on the framework as well in order to try hard to provide an idea for the solution of the scientific problem of software attack classification, and lay the foundation for building the attack knowledge model, as well as suggest the clear attacking ideas for researchers whom are working for security detection or safety test and evaluation, thus do the theoretical spadework for constructing the software attack system aiming at the security protection.
出处 《计算机应用与软件》 CSCD 2015年第2期283-287,共5页 Computer Applications and Software
基金 国家自然科学基金项目(61070176 61170218 61272461) 高等学校博士点基金项目(20106101110018) 陕西省科技攻关计划项目(2011K06-07) 陕西省教育厅产业化培育项目(2011jg06)
关键词 软件攻击 攻击描述 攻击分类 分类评价 攻击技术 Software attack Attack description Attack classification Evaluation of classification Attack technology
  • 相关文献

参考文献19

  • 1Xie P D, Li M J, Wang Y J, et al. Unpacking Techniques and Tools in Malware Analysis [ J ]. Applied Mechanics and Materials, 2012,198 - 199:943 - 350.
  • 2李莉.软件水印攻击综述[C]//第十五届信息论学术年会.青岛:中国电子学会,2008:525-530.
  • 3Raber J, Laspe E. Deobfuscator: An automated approach to the identifi- cation and removal of code obfuscation [ C ]//Proceedings of the Re- verse Engineering. 2007:275 - 276.
  • 4Udupa S K, Debray S K, Madou M. Deobfuscation:Reverse engineering obfuscated code[ C ]//Proceedings of 12th Working Conference on Re- verse Engineering( WCRE), 2005:45 - 54.
  • 5Canzanese JR, Oyer M, Maneoridis S, et al. A survey of reverse engi- neering tools for the 32-bit Microsoft Windows environment[ D]. Drexel University, USA ,2005 : 17 - 20.
  • 6看雪论坛[OL].http://kanxue.COITI.
  • 7tuts4You论坛[OL].http://tuts4you.corn.
  • 8Howard J D. An analysis of security incidents on the Internet 1989- 1995 [ D ] USA : Carnegie Mellon University, 1997.
  • 9Paulauskas N, Garsva E. Computer system attack classification [ J ]. E- lectronics and Electrical Engineering,2006,2 (66) :84 -87.
  • 10Lough D L. A taxonomy of computer attacks with applications to wire- less networks [ D ]. USA : Virginia Polytechnic Institute and State Uni- versity, 2001.

二级参考文献47

  • 1刘欣然.网络攻击分类技术综述[J].通信学报,2004,25(7):30-36. 被引量:36
  • 2向尕,曹元大.一种面向检测的攻击分类方法及在IDS中的应用[J].计算机工程,2004,30(11):94-95. 被引量:3
  • 3向尕 曹元大 周旭.基于攻击树的IDS攻击模式自动建立研究[Z]..中国科协首届博士生学术交流大会[C].深圳,2002..
  • 4AMOROSO E G. Fundamentals of computer security technology [ M ]. Englewood Cliffs, New Jersey : Prentice Hall, 1994.
  • 5JAYARAM N, MORSE P. Network security: a taxonomic view[ C]// Proc of European Conference on Security and Detection. 1997:124- 127.
  • 6LINDQVIST U,JONSSON E. How to systematically classify computer security intrusions [ C ]//Proc of IEEE Symposium on Security and Privacy. Oakland, CA : IEEE Computer Society, 1997 : 154-163.
  • 7KENDALL K. A database of computer attacks for the evaluation of intrusion detection systems [ D ]. Massachusetts : Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1999.
  • 8HOWARD J D. An analysis of security incident on the Internet [ D ]. West Lafayette : Carnegie Mellon University, 1995.
  • 9美国国家安全局.IATFrelease31[R].2002.
  • 10NEUMANN P, PARKER D. A summary of computer misuse techniques[ C]//Proc of the 12th National Computer Security Conference. 1989:396-407.

共引文献14

同被引文献42

引证文献5

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部