期刊文献+

面向可生存性的网络攻击分类方法 被引量:2

Survivability-oriented taxonomy of network attacks
下载PDF
导出
摘要 网络攻击分类是研究网络攻击特点及其防护方法的前提,介绍了网络攻击分类的研究现状,对已有网络攻击分类方法进行了分析比较,提出了一种面向网络可生存性研究的网络攻击分类方法,并用实例说明了该分类方法的分类过程。该方法对网络防护人员进行网络可生存性提升很有帮助,为他们有针对性地研究网络可生存性技术提供了依据。 The taxonomy of network attacks is the precondition of its characters study and defends methods; this paper introduced the study condition of network attacks taxonomies, compared them, and put forward a survivability-oriented taxonomy of network attacks, then showed the process of the taxonomy with explaining examples, This method is benefited for the network guarders improving the network survivability, they can study the survival, techniques depend on this result.
出处 《计算机应用》 CSCD 北大核心 2008年第B06期63-65,70,共4页 journal of Computer Applications
关键词 可生存性 网络安全 网络攻击分类 survivability network security taxonomy of network attacks
  • 相关文献

参考文献15

  • 1HOLLWAY B A, NEUMMAN P G. Survivable computer-communication systems: The problem and working group recommendations [ R]. Washington: US Army Research Laboratory, 1993. 被引量:1
  • 2FISHER J, LINGER R. Survivability: protecting your critical systems [ J]. Internet Computing, 1999, 3 (6) : 55 - 63. 被引量:1
  • 3Ranum M J. A taxonomy of Intemet attacks[ EB/OL]. [ 2007 - 10 - 17 ]. http://pubweb, nfr. net/? mjr/pubs/pdf/intemet-attacks. pdf. 被引量:1
  • 4LINDQVIST U, JONSSON E. How to systematically classify computer security intrusions[ C]// IEEE Symposium on Security and Privacy. Oakland, California: IEEE Computer Society Press, 1997:154 - 163. 被引量:1
  • 5HOWARD J D. LONGSTAFF T A. A common language for computer security incidents, SAND98-8667 [ R]. Califomia: Sandia National Laboratories, Albuquerque, New Mexico and Livermore, 1998. 被引量:1
  • 6LIPPMANN R P, FRIED D J, GRAF I, etal. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation [ C]// The First International Workshop on Recent Advances in Intrusion Detection. Louvain-la-Neuve, Belgium: [ s. n.], 2000. 被引量:1
  • 7KILLOURHY K S, MAXION R A, TAN K M C. A defense-centric taxonomy based on attack manifestations [ C]// DSN'04: Proceedings of the 2004 International Conference on Dependable Systems and Networks. Washington: IEEE Computer Society, 2004. 被引量:1
  • 8KUMAR S. Classification and detection of computer intrusions[ D]. West Lafayette: Purdue University, Computer Department, 1995. 被引量:1
  • 9LANDWEHR C E, BULL A R, McDERMOTT J P, et al. A taxonomy of computer program security flaws, with examples[J]. ACM Computing Surveys, 1994, 26(3) : 211 - 254. 被引量:1
  • 10LOUGH D L. A taxonomy of computer attacks with applications to wireless networks[ EB/OL]. [ 2007 - 10 - 17]. http://scholar. lib. vt. edu/theses/avallable/etd-04252001-234145/unrestricted/lough, dissertation, pdf. 被引量:1

同被引文献18

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 2王树鹏,云晓春,余翔湛.系统生存性增强技术研究[J].哈尔滨工业大学学报,2007,39(3):452-456. 被引量:1
  • 3赖积保,王慧强,王健.系统可生存性研究综述[J].计算机科学,2007,34(3):237-239. 被引量:7
  • 4潘晓龙.现代汉语实用词典[S].海口:南方出版社,2002:305. 被引量:1
  • 5BARNES A,HOLLWAY A,NEUMANN P G.Survivable computer communication systems:The problem and working group recommendations,VAL-CE-TR-92-22[R].Washington,DC:US Army Research Laboratory,1993. 被引量:1
  • 6DEUTSCH M S,WILLS R R.Software quality engineering:A total technical and management approach[M].Upper Saddle River,N J,USA:Prentice Hall,1988. 被引量:1
  • 7ELLISON R J,FISHER D A,LINGER R C,et al.Survivable network system:An emerging discipline,CMU/SEI-97-TR-013[R].Pittsburgh,PA:Carnegie Mellon University,Software Engineering Institute,1997. 被引量:1
  • 8ELLISON R J,FISHER D A,LINGER R C,et al.Survivability:Protecting your critical systems[J].IEEE Journal of Interact Computing,1999,3(6):55-63. 被引量:1
  • 9HILTUNEN M A,SCHLICHTING R D,UGARTE C A,et al.Survivability through customization and adaptability:The cactus approach[EB/OL].[2009-08-02].http://www.dependability.org/wg10.4/meeting38/12-schli.pdf. 被引量:1
  • 10KNIGHTJC,SULLIVAN K J,WANGC.On the dofinition of survivability,CS-TR-33-00[R].Charlottesville,VA:University of Virginia,Department of Computer Science,2000. 被引量:1

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部