期刊文献+

网络安全风险评估与控制研究 被引量:1

下载PDF
导出
摘要 针对网络安全威胁和攻击,对网络系统和终端的脆弱性的描述方法和检测方法进行了阐述,并对风险控制行为综合评述,指出在当今网络环境中,网络风险并不是完全可控的,只能根据网络安全级别降低网络风险发生的概率及减小风险发生时带来的危害。
作者 肖利强
机构地区 河南科技大学
出处 《电子技术与软件工程》 2016年第7期215-215,共1页 ELECTRONIC TECHNOLOGY & SOFTWARE ENGINEERING
  • 相关文献

参考文献4

二级参考文献30

  • 1冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:31
  • 2Mehta V, Bartzis C, Zhu H F. Ranking attack graphs//Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID). Hamburg, Germany, 2006, 127-144.
  • 3Sawilla R, Ou X M. Identifying critical attack assets in dependency attack graphs//Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS). Malaga, Spain, 2008:18-34.
  • 4Ou X M, Boyer W F. A scalable approach to attack graph generation//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS). Alexandria, USA, 2006. 336-345.
  • 5Wang L Y, Tania I. An attack graph-based probabilistic security metric//Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec). London, UK, 2008:283-296.
  • 6Homer J, Ou X M, Schmidt D. A sound and practical approach to quantifying security risk in enterprise networks. Kansas State University: Technical Report 2009-3, 2009.
  • 7Singhal A, Ou X M. Security risk analysis of computer networks: Techniques and challenge//Proceedings of the 16th ACM Computer and Communications Security(CCS). Chicago, USA, 2009.
  • 8Wang L Y, Singhal A, Jajodia S. Measuring the overall security of network configurations using attack graphs//Proceedings of the 21th IFIP WG 11. 3 Working Conference on Data and Applications Security (DBSee). Redondo Beach, CA, USA, 2007:98-112.
  • 9Wang L Y, Singhal A, Jajodia S. Toward measuring network security using attack graphs//Proceedings of the 3rd International Workshop on Quality of Protection (QoP). Alexandria, USA, 2007:49-54.
  • 10Chinchani R,Upadhyaya S,Kwiat K.Towards the scalable implementation of a user level anomaly detection system[C]// In Proceedings of the 2002 IEEE Milcom Conference,Anaheim,CA,2002.

共引文献48

同被引文献8

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部