%0 Journal Article %T Right-Variation Rule Based Network Vulnerability Analysis
基于权限变更规则的网络脆弱性分析方法 %A MO Qiu-Mei %A CHEN Qi-Mai %A
莫秋妹 %A 陈启买 %J 计算机系统应用 %D 2012 %I %X Network vulnerability can lead to fight-variation. From the view of how an attacker uses the vulnerabilities to achieve the unauthorized right of the destination entity, this paper models the vulnerabilities which lead to fight-variation and introduces the concept of take rule and vulnerability fight-variation rule. Based on the constructed right-variation model and the rules, the right-variation road closure can be achieved by using the vulnerability right-vafiation algorithm. A vulnerable network is modeled as the study case and it shows the effectiveness of the approach. %K network security %K vulnerability %K vulnerability analysis %K right-variation
网络安全 %K 脆弱点 %K 脆弱性分析 %K 权限变更 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=D4F6864C950C88FFCE5B6C948A639E39&aid=57C6AD9B0ADA0537BBD705699766883C&yid=99E9153A83D4CB11&vid=659D3B06EBF534A7&iid=B31275AF3241DB2D&sid=6700D0D256586E73&eid=8C83C265AD318E34&journal_id=1003-3254&journal_name=计算机系统应用&referenced_num=0&reference_num=15