期刊文献+

基于网络的安全漏洞分类与扫描分析 被引量:5

Analysis for The Classification Scanner Method of Network Vulnerability
下载PDF
导出
摘要 在网络安全中漏洞扫描起着发现安全隐患的作用。文中介绍了网络安全漏洞的分类, 阐述了网络安全漏洞扫描原理,并在基于协议分类的基础上,结合各类漏洞的扫描,归纳了三种 主要的网络漏洞扫描方法。 In network security, the vulnerability scanner will find the hidden vulnerability. In this paper, the classifications of vulnerability and the principle of vulnerability scanner are introduced. Based on the protocol classification, and combined with the scanning of all kinds of vulnerabilities, three kinds of scan methods are introduced as well.
出处 《信息与电子工程》 2004年第4期318-320,共3页 information and electronic engineering
基金 国家自然科学基金(60372039)
关键词 计算机系统结构 安全漏洞分类 安全漏洞扫描 综述 网络协议 漏洞特征码 computer architecture vulnerability sort vulnerability scanning survey network protocol condition code
  • 相关文献

参考文献6

二级参考文献18

  • 1阎雪.黑客就这么几招[M].北京:万方数据电子出版社,2000.. 被引量:6
  • 2程秉辉 John Hawke.黑客任务实战:攻略篇[M].北京:北京希望电子出版社,.. 被引量:1
  • 3[3]Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies. Department of Computer Science at the University of California at Davis, 1996 被引量:1
  • 4[4]Aslam T,Krsul I.Use ofa Taxonomy of Security Faults. Eugene Spaff ord.In Proceedings of the 19th National Information Systems Security Conference,1996 被引量:1
  • 5[5]Krsul 0Software Vulnerability Analysis. Department of Computer Scie nces, Purdue University, 1998 被引量:1
  • 6[6]Knight E.Computer Vulnerabilities.http://www.securityparadigmcom/, 2000 被引量:1
  • 7[1]Denning D E.Cryptography and Data Security. Addison-Wesley Publis hing Company, 1983 被引量:1
  • 8[2]Marick B.A Survey of Software Fault Surveys. University of Illinois at rbana-Champaign, 1990 被引量:1
  • 9[2]绿色兵团. UNIX系统安全评估和监测工具[EB/OL]. http://202.102.240.75/linux/security/97.html,1999-12-09. 被引量:2
  • 10[1]Fyodor.Nmap网络安全扫描器说明(1,2).[EB/OL]http://oldhand. org/article/200204/20020400000278_1. xml.2002-04-12. 被引量:1

共引文献92

同被引文献34

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部