全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Right-Variation Rule Based Network Vulnerability Analysis
基于权限变更规则的网络脆弱性分析方法

Keywords: network security,vulnerability,vulnerability analysis,right-variation
网络安全
,脆弱点,脆弱性分析,权限变更

Full-Text   Cite this paper   Add to My Lib

Abstract:

Network vulnerability can lead to fight-variation. From the view of how an attacker uses the vulnerabilities to achieve the unauthorized right of the destination entity, this paper models the vulnerabilities which lead to fight-variation and introduces the concept of take rule and vulnerability fight-variation rule. Based on the constructed right-variation model and the rules, the right-variation road closure can be achieved by using the vulnerability right-vafiation algorithm. A vulnerable network is modeled as the study case and it shows the effectiveness of the approach.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133