期刊文献+

计算机公共弱点/风险(CVE)体系结构的研究 被引量:2

Research of CVE Structure
下载PDF
导出
摘要 通过对计算机公共弱点/风险(CVE)列表所列漏洞进行了深入分析的基础上,依据对漏洞抽象层次和漏洞看待角度的不同,建立了多种CVE体系结构,包括树形结构、视角三维、产生三维等,并给出了由有穷自动机实现的CVE树形结构的形式化描述.CVE体系结构的建立对理解、避免、检测和消除计算机系统漏洞具有理论和实践意义. This paper does a deep analysis of Common Vulnerabilities and Exposures(CVE). On the base of it, a CVE structure according to manifold points of view and abstract grades, such as tree structure viewing three - dimensio structure and occurring structure is constructed. Then a formal description using for the tree structure is provided. This CVE structure is valuable for the understanding, avoiding, detecting and removing of vulnerabilities and exposures.
出处 《哈尔滨理工大学学报》 CAS 2003年第4期67-70,共4页 Journal of Harbin University of Science and Technology
基金 黑龙江省自然科学基金资助(F0204)
关键词 计算机 公共弱点/风险 CVE 体系结构 系统漏洞 形式化描述 网络安全 CVE network security IDS formalization
  • 相关文献

参考文献5

  • 1李昀,李伟华.基于星型网模型的安全漏洞分类[J].计算机工程与应用,2002,38(7):42-43. 被引量:7
  • 2CARL Landwher, et al. A Taxonomy of Computer Grogram Security Flaws. Technical report [M].Naval Research Laboratory,November, 1993.
  • 3ASLAM Taimur, KRSUL Ivan, SPAFFORD Eugene. Use of Taxonomy of Security Faults [A]. 19th National Information System Security Conference[C]. Baltimore, Maryland, 1996. 22-25.
  • 4NING Peng, WANG X Sean. JAJODIA Sushil. A query facility for common intrusion detection framework [A]. In Proceedings of the 23rd National Information Systems Security Conference [C].Baltimore, MD, 2000.
  • 5BISHOP M. A Taxonomy of UNIX System and Network Vulnerabilities [A], Technical Report 95 - 10, Department of Computer Sciences [C].University of California, at Davis, 1995.

二级参考文献5

  • 1[1]Amoroso E G.Fundamentals of Computer Security Technology. Prentiee-Hall PTR,Upper Saddle River, NJ, 1994: 23-26
  • 2[2]Bishop M.Classifying Vulnerabilities. NISSC Panel on Vulnerabilities Data:The UC Davis Vulnerabilities Project, 1996.10
  • 3[3]Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies.CSE-96-11,1996.9
  • 4[4]Landwehr C E,Bull A R,McDermott J P et al.A Taxonomy of Computer Program Security Flaws.Information Technology Division,Naval Research Laboratory,Washington,D.C.,WA 20375-5337,1994
  • 5[5]Krsul I V.Software Vulnerability Analysis[D].Ph.D.Thesis.Purdue University,Computer Sciences Department, 1998

共引文献6

同被引文献10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部