期刊文献+

一种面向响应的网络安全事件分类方法 被引量:4

A Classification Method of Network Security Incidents for Response
下载PDF
导出
摘要 网络安全事件分类的研究对于应急响应体系建设有着重要的意义。该文首先给出了相关的概念描述,接着说明了分类研究的意义与要求,然后在介绍安全事件相关分类研究的基础上,提出了一种面向应急响应的网络安全事件分类方法,最后指出了进一步工作的方向。 The study of classification of network security incidents has a significant role for the building of the incident response system. In this paper, a note on terminology is given firstly, then the significance and requirements of the classification study are explained. Based on the introduction of related studies, this paper presents a classification method of network security incidents for response. Finally, the farther works is directed.
出处 《计算机工程》 CAS CSCD 北大核心 2004年第11期103-105,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2002AA142151) 中国科学院知识创新工程方向性项目(KGCX2-106) 北京市科技计划项目(H020120090530)
关键词 应急响应 安全事件 分类学 计算机安全 Emergency response Security incident Taxonomy Computer security
  • 相关文献

参考文献6

  • 1[1]CERT Coordination Center. CERT/CC Statistics 1988-2002. http:// www.cert.org/stats/cert_stats.html 被引量:1
  • 2[2]Landwehr C E, Bull A R, McDermott J P, et al. A Taxonomy of Computer Program Security Flaws. ACM Computing Surveys, 1994,26 (3): 211-254 被引量:1
  • 3[3]Lindqvist U, Jonsson E. How to Systematically Classify Computer Security Intrusions. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland CA, 1997-05 被引量:1
  • 4[4]Howard J D, Longsta T A. A Common Language for Computer Security Incidents. Technical Report SAND98-8667, Sandia National Laboratories, 1998-10 被引量:1
  • 5[6]Carver C A, Jr. Hill J M D, Pooch U. A Methodology for Using Intelligent Agents to Provide Automated Intrusion Response. In IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, New York, 2000-06-06 被引量:1
  • 6[7]Carver C A, Pooch U. An Intrusion Response Taxonomy and Its Role in Automatic Intrusion Response. In IEEE Systems, Man, and Cyber- netics Information Assurance and Security Workshop, West Point, New York, 2000-06-06 被引量:1

同被引文献17

  • 1郭渊博,马建峰.容忍入侵的国内外研究现状及所存在的问题分析[J].信息安全与通信保密,2005(7):337-341. 被引量:16
  • 2胡文,黄皓.自动入侵响应技术研究[J].计算机工程,2005,31(18):143-145. 被引量:6
  • 3吴庆涛,邵志清.入侵检测研究综述[J].计算机应用研究,2005,22(12):11-14. 被引量:19
  • 4[1]Edward G. Amoroso. Fundamentals of Computer Security Technology[R]. USA:Prentice-Hall PTR, 1994. 23-26. 被引量:1
  • 5[2]John D Howard. An Analysis of Security Incident on the Internet[D]. USA:Carnegie Mellon University, 1997. 被引量:1
  • 6[3]Daniel Lowry Lough. A Taxonomy of Computer Attacks with Applications to Wireless Networks[D]. USA: Virginia Polytechnic Institute and State University, 2001. 被引量:1
  • 7[4]Gordon Steele. Information Systems Security Incident Response[J]. IAnewsletter, 2002,(5): 14-22. 被引量:1
  • 8[5]Bishop M. A Taxonomy of UNIX System and Network Security Vulnerabilities [R]. USA: University of California,1995. 被引量:1
  • 9[8]Landwehr C E, Bull A R, McDermott J P, et al. A Taxonomy of Computer Program Security Flaws[J]. ACM Computing Surveys, 1994,26(3):211-254. 被引量:1
  • 10[9]Lindqvist U, Jonsson E. How to Systematically Classify Computer Security Intrusions[A]. Proceedings of the IEEE[C]. IEEE, 1997.154-163. 被引量:1

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部