期刊文献+

网络系统生存性分析研究

Research on survivability analysis of network system
下载PDF
导出
摘要 在对网络攻击理论深入研究的基础上,通过建立攻击模型,构造攻击场景,对目标系统实施攻击测试,分析攻击对目标系统造成的危害和系统的可恢复性,判断其是否达到系统的生存性需求,并提出相应改进建议。 On the basis of deep study in the theory of attack, attack model and attack scenario was built. Then the severity and the recovery were analyzed that the target systems was attacked testing. Finally the requirements of survivability of target systems were obtained, and corresponding improved suggestions were given.
出处 《计算机应用研究》 CSCD 北大核心 2007年第11期111-113,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(50276070) 军队"2110"工程建设项目
关键词 生存性 攻击模型 攻击场景 危害度 survivability attack model attack scenario severity
  • 相关文献

参考文献8

  • 1MEAD N R,ELLISON R J,LINGER R C,et al.Survivable network analysis method,CMU/SEI-2000-TR-013[R].[S.l.]:SEI,2000. 被引量:1
  • 2ELLISON R J,LINGER R C,LONGSTAFF T,et al.A case study in survivable network system analysis,CMU/SEI-98-TR-014[R].[S.l.]:SEI,1998. 被引量:1
  • 3JHA S,WING J,LINGER R,et al.Survivability analysis of network specifications[C]//Proc of Workshop on Dependability Despite Malicious Faults,2000 International Conference on Dependable Systems and Networks (DSN 2000).New York:IEEE Computer Society,2000:613-622. 被引量:1
  • 4郭渊博,马建峰.分布式系统中服务可生存性的定量分析[J].同济大学学报(自然科学版),2002,30(10):1190-1193. 被引量:34
  • 5夏春和,王继伟,赵勇,吴震.可生存性分析方法研究[J].计算机应用研究,2002,19(12):28-32. 被引量:7
  • 6SCHNEIER B.Attack trees:modeling security threats[J].Journal of Software Tools,1999,24(12):21-29. 被引量:1
  • 7JENSEN K.Colored Petri nets:basic concepts,analysis methods and practical use volume 1:basic concepts[M].2nd corrected printing.New York:Springer-Verlag,1997. 被引量:1
  • 8SWILER P,PHILLIPS C,GAYLOR T.A graph-based network vulnerability analysis system[R].[S.l.]:Sandia National Laboratories,1997. 被引量:1

二级参考文献18

  • 1[1]S Muftic, A Patel, et al. Security Architecture for Open Distributed Systems[ C]. John Wiley & Sons, 1993.5-9. 被引量:1
  • 2[2]G Tsudik. Access Control and Policy Enforcement in Internetworks[ C]. Ph. D Dissertation, University of Southern California.April, 1991.2-7. 被引量:1
  • 3[3]David E Ferraiolo, Janet A Cugini, D Richard Kuhn. Role-based Access Control ( RBAC ) : Features and Motivations [C].Proceedings 1 1th Annual Computer Security Application Conference, New Orleans, LA, 1995,7-19. 被引量:1
  • 4[4]National Computer Security Center. A Guide to Understanding Discretionary Access Control in Trusted Systems[S]. 1987.8-27. 被引量:1
  • 5[5]K Sullivan, J Knight, X Du, S Geist. Information Survivability Control Systems [C]. Proceedings: 21st International Conference on Software Engineering, IEEE Computer Society Press, Los alamitos, CA, 1999.40-71. 被引量:1
  • 6[6]Lipson H, Longstaff T. Proceedings of the SEI 1997 Information Survivability Workshop[ C]. San Diego, CA, Feb. 10-13, 1997.Los Alamitos, CA: IEEE Computer Society Press, 1997. 被引量:1
  • 7[7]R C Linger, N R Mead, et al. Requirements Definition for Survivable Network Systems[ EB/OL]. http://www. cmu. edu/. 被引量:1
  • 8[8]Fredrik Moberg. Security Analysis of an Information System Using an Attack Tree-based Methodology [ EB/OL]. http://www.ce. chalmers. se/staff/jonsson/fredrik. moberg-thesis. pdf. 被引量:1
  • 9Hollway B A,Neumann P G.Survivable computer-communication systems:The problem and working group recommendations[R].Washington:US Army Research Laboratory,1993. 被引量:1
  • 10Neumann P.Commputer related risks[M].Boston:Addison-Wesley,1995. 被引量:1

共引文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部