期刊文献+

基于ontology的安全漏洞分析模型 被引量:3

VULNERABILITY ANALYSIS:A TARGET/SOURCE-CENTRIC ONTOLOGY MODEL
下载PDF
导出
摘要 采用本体为工具建立脆弱性模型。模型的主要特点是分别独立定义了以攻击目标为中心的脆弱性模型和以攻击源头为中心的脆弱性模型两部分,并阐述两者的关系。攻击方可以很自然地使用以攻击源头为中心的脆弱性模型部分;防御方可以很自然地使用以攻击目标为中心的脆弱性模型部分,并在两个独立领域里建立交流,为拓宽双方的知识提供了平台。 An ontology specifying a model of computer attacks is proposed. Its main feature is both target-centric and source-centric. With the help of this model, the attackers and defenders of system and network security can communicate each other with common language.
出处 《计算机应用与软件》 CSCD 北大核心 2006年第5期121-123,共3页 Computer Applications and Software
关键词 脆弱性分析 本体 安全策略 Vulnerability analysis Ontology Security policy
  • 相关文献

参考文献9

  • 1G.Fink and K.Levitt,"Property-based testing of privileged programs".In Proceedings of the Inch Annual Computer Security Applications Conference:Orlando,FL.USA,1994. 被引量:1
  • 2C.R.Ramakrishnan and R.Sekar,"Model-Based Vulnerability Analysis of Computer Systems".2nd Int'I Workshop on Verification.Model Checking and Abstract Interpretation,1998. 被引量:1
  • 3O.Sheyner,l.Haines.S.Jha,R.Lippmann,and J.Wing,"Automated generation and analysis of attack graphs",Proceedings of the 2002 IEEE Symposium on Security and Privacy(Oakland 2002).Oakland.CA.May 2002. 被引量:1
  • 4Richard R.Linde,"Operating System Penetration",1975 National Computer Conference Proceedings(AFIPS Conference Proceedings 44),pp.361~368(May 1975). 被引量:1
  • 5R.P.Abbott,J.S.Chin,J.E.Donnelley,W.L.Konigsford,S.Tokubo,and D.A.Webb,"Security Analysis and Enhancements of Computer Operating Systems",NBSIR 76-1041.Institute for Computer Sciences and Technology.National Bureau of Standards(Apr.1976). 被引量:1
  • 6Aslam,"A Taxonomy of Security Faults in the Unix Operating System",MS.thesis.Purdue University,1995. 被引量:1
  • 7Power R.,"Current And Future Danger:A CSI Primer of Computer Crime & Information Warfare",CSI Bulletin.1996. 被引量:1
  • 8P.G.Neumann,"Computer System Security Evaluation",1978 National Computer Conference Proccedings(AFIPS Conference Proceedings 47),pp.1087~1095.June 1978. 被引量:1
  • 9Jeffrey L Undercoffer et al.,"Modeling Computer Attacks:An Ontology for Intrusion Detection",The Sixth International Symposium on Recent Advances in Intrusion Detection,September 2003. 被引量:1

同被引文献21

  • 1肖云,王选宏.基于网络安全知识库的入侵检测模型[J].计算机应用研究,2009,26(3):1079-1081. 被引量:2
  • 2陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 3王慧强,赖积保,朱亮,梁颖.网络态势感知系统研究综述[J].计算机科学,2006,33(10):5-10. 被引量:126
  • 4BASS T. A glimpse into the future of ID[ EB/OL]. [ 2014-03-01 ]. http://www, usenix, org/publieations/login/1999-9/features/fu- ture. html. 被引量:1
  • 5BASS T. Intrusion detection systems and muhisensor data fusion: creating cyberspace situational awareness[ J]. Communications of the ACM, 2000, 43(4) : 99 - 105. 被引量:1
  • 6SHIFFLET J. A technique independent fusion model for network in- trusion detection[ C]// Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics, Uni- versity of Denison. Granville: University of Denison, 2005:13 -19. 被引量:1
  • 7MATHEUS C J, KOKAR M M, BACLAWSKI K. A core ontology for situation awareness[ C]// Proceedings of the 6th International Confer- ence on Information Fusion. Piscataway: IEEE, 2003:545 - 552. 被引量:1
  • 8JAKALAN A. Network security situational awareness[ J]. Interna- tional Journal of Computer Science and Communication Security, 2013, 3:61 -67. 被引量:1
  • 9孟字龙.基于本体的多源异构安全数据聚合[D].哈尔滨:哈尔滨工程大学,2010. 被引量:1
  • 10GUANRINO N. Formal ontology, conceptual analysis and knowledge representation[ J]. Human-Computer Studies, 1995, 43 (5/6) : 625 - 640. 被引量:1

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部