期刊文献+

UNIX/LINUX脆弱性探测器的设计与实现

Design and implementation of frangibility detector for UNIX/LINUX
下载PDF
导出
摘要 分析了UNIX/LINUX系统的安全脆弱性,设计并实现了一个针对UNIX/LINUX系统的分布式脆弱性探测系统.该脆弱性探测系统被设计为Client/Server模型,服务器端负责进行安全检查,客户端主要用来定制探测内容和查看探测结果.服务器端的脆弱性探测模块具体执行探测请求时,是调用脆弱性探测插件库子模块来实现的,脆弱性探测插件库子模块是探测器的核心部分,给出了主要探测子模块的关键数据结构和实现原理. The security frangibility for UNIX/LINUX hosts is analyzed; and a distributed frangibility detector is designed for UNIX/LINUX hosts. The frangibility detecting system is designed to Client/Server. The server is actually in charge of the attacks, whereas the client is just a front-end designed to configure detecting content and collect the results. The frangibility detecting module of server concretely executes a detecting request, depending on frangibility detecting plug-in units submodule. Frangibility detecting plug-in units submodule is central to the frangibility detector. Some key data structure and theory of implementation are discussed on primary detecting submodules of server.
出处 《武汉大学学报(工学版)》 CAS CSCD 北大核心 2005年第2期132-136,共5页 Engineering Journal of Wuhan University
关键词 脆弱性探测器 UNIX/LINUX 系统安全 插件 frangibility detector UNIX/LINUX system security plug-in unit
  • 相关文献

参考文献4

二级参考文献19

  • 1[1]The ICAT team. ICAT Comprehensive Vulnerability Ranking System.http://icat.nist.org 被引量:1
  • 2[2]Mann D E,Christey S M.Towards a Common Enumeration of Vulnerabilities[C].In:Presented at 2nd Workshop on Research with Security Vulnerability Databases,Purdue University,West Lafayette, IN ,1999 被引量:1
  • 3[3]Baker D W,Christey S M,Hill W H et al.The Development of a Common Enumeration of Vulnerabilities and Exposures[C].In:the Second International Workshop on Recent Advances in Intrusion Detection, 1999 被引量:1
  • 4[4]Elz R,Bush R.Clarifications to the DNS Specification[S].RFC 2181,1997-07 被引量:1
  • 5[5]Mockapetris P.Domain names-concepts and facilities[S].RFC 1034,1987-11 被引量:1
  • 6[6]Mockapetris P.Domain names-implementation and specification[S].RFC 1035,1987-11 被引量:1
  • 7Pete Loshin. Network Vulnerability Scanning Keeping Your Networks Buttoned Up[J].Boardwatch Magazine,http://www. ispworld.com/bw/nov/Network_Vulnerability_Scanning.htm) 被引量:1
  • 8Jeff Forristal,Greg. Shipley Vulnerability Assessment Scanners.2001 被引量:1
  • 9Freiss M.Protecting Networks with SATAN[M].O'Reilly & Associates,Inc, 1998 被引量:1
  • 10R Bishop. Classifying vulnerabilities[C].In Proc of 19th National Information System Security Conference,1996 被引量:1

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部