期刊文献+

计算机系统脆弱性评估研究 被引量:84

A Survey of Computer Vulnerability Assessment
在线阅读 下载PDF
导出
摘要 在计算机安全领域 ,特别是网络安全领域 ,对计算机系统进行脆弱性评估十分重要 ,其最终目的就是要指导系统管理员在“提供服务”和“保证安全”这两者之间找到平衡 .脆弱性评估方法的发展经历了从手动评估到自动评估的阶段 ,现在正在由局部评估向整体评估发展 ,由基于规则的评估方法向基于模型的评估方法发展 ,由单机评估向分布式评估发展 .该文阐述了脆弱性评估所要解决的问题 。 Computer vulnerability assessment has experienced the stage of manual to automatic. It’s now expanding from partial assessment to holistic, from rule based to model based, from single host to distributed. In the applications of computer security, assessing network’s vulnerabilities is usually required. To make the result comprehensive and accurate, the target of assessment must be considered as a whole system with dynamic and distributed features. The system is holistic both in time and space. The security of network system should be ensured as a whole all along rather than some host at sometime. The rule based assessing methods have been well studied. This is the base of the model based methods. At the same time, the model based methods have made rapid progress. Many model based methods start with different angles and have different advantages. For example, the Requires/Provides model can be suitable for attack generation and intrusion detection. Ritchey’s model is more efficient for describing the exploitation of well known network vulnerabilities than other models. Ramakrishnan’s model is fit for analyzing system vulnerabilities from local host.Further researches could focus on the following aspects: to build new models, to refine the existing models or the analyzing methods. Such three aspects are not completely independent. When building or refining a model, the factors relevant to security of actual systems could be added to the model step by step so that the model can solve actual problems more powerfully. Many methods might be introduced to analyze a security model,such as temporal logic, CPN and SHLPN (stochastic High level Petri net). And these can provide powerful mathematic tools for formal analysis of security models.
出处 《计算机学报》 EI CSCD 北大核心 2004年第1期1-11,共11页 Chinese Journal of Computers
基金 国家"九七三"重点基础研究发展规划项目(G19990 3 2 70 7) 国家"八六三"高技术研究发展计划项目(2001AA112 0 80 ) 国家自然科学基金(90 10 40 0 2 60 173 0 12 )资助
关键词 网络安全 计算机网络 计算机安全 计算机病毒 计算机系统 脆弱性评估 system security network security vulnerability vulnerability assessment security model Petri nets
  • 相关文献

参考文献31

  • 1Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996
  • 2Longley D. , Shain M. , Caelli W.. Information Security: Dictionary of Concepts, Standards and Terms. New York: Macmillan, 1992
  • 3Beizer B.. Software Testing Techniques. 2nd edition. International Thomson Computer Press, 1990
  • 4Farmer D. , Spafford E. H.. The COPS security checker system. Purdue University, West Lafayette: Technical Report,Coast TR 94-01, CSD-TR-993, 1990
  • 5Baldwin R. W.. Kuang: Rule-based security checking. Programming Systems Research Group, Lab for Computer Science, MIT, Massachusetts: Technical Report, 1994
  • 6Zerkle D. , Levitt K. , NetKuang: A multi-host configuration vulnerability checker. In: Proceedings of the 6th USENIX Security Symposium, San Jose, CA, 1996
  • 7Porras P. A. , Kemmerer R. A.. Penetration state transition analysis: A rule-based intrusion detection approach. In: Proceedings of the Eighth Annual Computer Security Applications Conference, 1992, 220~229
  • 8Ilgun K.. USTAT: A real-time intrusion detection system for UNIX. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 16
  • 9Jensen K.. Colored petri nets: Basic concepts, analysis methods and practical use. vol. 1. 2nd edition. Berlin, Germany:Springer-Verlag, 1997
  • 10Kumar S.. Classification and detection of computer Intrusions [Ph. D. dissertation]. Department of Computer Science, Purdue University,West Lafayette, 1995

同被引文献689

引证文献84

二级引证文献630

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部