期刊文献+

网络安全脆弱性分析与处置系统的研究与实现 被引量:11

Study and Implementation of Network Security Vulnerabilities Analysis and Disposition System(NSVADS)
下载PDF
导出
摘要 在分析国内外研究现状的基础上,针对现有的漏洞库系统在漏洞信息的组织、使用等方面存在的不足,采用分布计算技术、数据库技术、Web技术实现了网络安全脆弱性分析与处置系统。该系统实现了基于Web的漏洞库(含补丁库)的访问与维护工具,便于获取相应漏洞的解决方案和下载相应的补丁程序,降低了系统维护的开销,提高了系统的可维护性;补丁推送程序实现了对系统补丁程序的远程推送、漏洞修补和补漏检测,提高了系统的自动化程度,为网络安全脆弱性处置提供了有力工具。 After analyzing the research situation and the shortcoming of vulnerabilities database system, the distributed computing technology, database technology and Web technology are used to implement NSVADS. Based on Web, it realizes the access and maintaining tool to vulnerabilities database. The solution to vulnerabilities and patches download can be disposed easily, and the cost of system maintainability can be reduced. Patches pushed modular can realize long-range patches pull, vulnerabilities mend, and vulnerabilities detection.It can improve the system's automatical vulnerabilities mend, and provide helpful tool for disposing the network security vulnerabilities.
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2004年第1期36-40,共5页 Journal of National University of Defense Technology
基金 国家863高技术资助项目(2001AA142030)
关键词 网络安全 脆弱性 漏洞库 中间件技术 WEB技术 补丁程序 处置系统 漏洞库系统 network security vulnerabilities vulnerabilities database middle-ware technology Web technology patches
  • 相关文献

参考文献3

二级参考文献11

  • 1Pete Loshin. Network Vulnerability Scanning Keeping Your Networks Buttoned Up[J].Boardwatch Magazine,http://www. ispworld.com/bw/nov/Network_Vulnerability_Scanning.htm)
  • 2Jeff Forristal,Greg. Shipley Vulnerability Assessment Scanners.2001
  • 3Freiss M.Protecting Networks with SATAN[M].O'Reilly & Associates,Inc, 1998
  • 4R Bishop. Classifying vulnerabilities[C].In Proc of 19th National Information System Security Conference,1996
  • 5Common Vulnerabilities and Exposures.http://cve.mitre.org/
  • 6Mike Fratto. Hammering Out a Secure Framework.2000 :http ://www.nwc.com/1101/1101 f3.html
  • 7http ://www. iss.net/securing_e-business/security_products/security_as-sessment/intemet_scanner/
  • 8Find Out How You Can Secure Your Network With Cisco Secure Scanner. www.cisco.com/public/sw-center/internet/netsonar.shtml
  • 9CyberCop Scanner.http:// www.pgp.com/products/cybercop-scanner/default.asp
  • 10.Intel StrongARM processors SA-1110 /SA-1111 Development Platform.http :/ / developer.intel.com/design/strong/1110_brf.htm

共引文献10

同被引文献42

引证文献11

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部