全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于模型的网络脆弱性定量分析方法

DOI: 10.13190/jbupt.200804.58.wangyl, PP. 58-61

Keywords: 网络,脆弱性,定量分析,安全风险

Full-Text   Cite this paper   Add to My Lib

Abstract:

将网络抽象为分层节点和同层连接的二元组。以各层协议实体的变量值组合表示网络状态,分为安全状态、错误状态和失败状态。阐述了脆弱点导致网络进入失败状态的原理。分析了脆弱点识别、验证和关联的依赖关系。提出定量的脆弱性计算方法,对脆弱性的性质进行了理论分析,提出3种安全风险削减方案。

References

[1]  Sheyner O, Haines J, Jha S. Automated generation and analysis of attack graphs//S&P '02. USA: IEEE Computer Society, 2002: 273-284.
[2]  Ou Xinming, Boyer W F, McQueen M A. A scalable approach to attack graph generation//CCS '06. Alexandria: ACM Press, 2006: 336-345.
[3]  Avizienis A, Laprie J, Randell B, et al. Basic concepts and taxonomy of dependable and secure computing[J]. IEEE Trans on Dependable and Secure Computing, 2004, 1(1): 11-33.
[4]  Ortalo R, Deswarte Y, Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security[J]. IEEE Trans on Software Engineering, 1999, 25(5): 633-650.
[5]  Pamula J, Ammann P. A weakest-adversary security metric for network configuration security analysis//QoP '06. Alexandria: ACM Press, 2006: 31-38.
[6]  Vardi Y, Zhang Cunhui. Measures of network vulnerability[J]. IEEE Signal Processing Letters, 2007, 14(5): 313-316.
[7]  山秀明, 王磊, 任勇, 等. 互联网复杂性研究进展[J]. 北京邮电大学学报, 2006, 29(1): 1-8. Shan Xiuming, Wang Lei, Ren Yong, et al. A survey on the Internet complexity. Journal of Beijing University of Posts and Telecommunications, 2006, 29(1): 1-8.
[8]  MITRE. Common vulnerabilities and exposures(CVE). .

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133