期刊文献+

考虑漏洞间相关作用的风险评估方法 被引量:1

Risk assessment on correlation of vulnerability
下载PDF
导出
摘要 信息安全问题随着时代的变迁日益复杂,而科学、合理的风险评估为信息安全提供了一种比较根本、有效的解决途径。运用可靠性分析的方法,提出了在计算机网络空间下,基于相关性漏洞的风险评估模型,对系统的攻击建模的研究提供了一个新的思路。 Information security is becoming more and more complicated with the tide of the times,so scientific and reasonable risk assessment provides a fundamental and effective solving ways for risk assessment.This paper uses the method of reliability analysis,puts forward a risk assessment model based on related vulnerability in the computer cyberspace,which is a new thought to the research of system attack modeling.
作者 包雷 钱存华
出处 《计算机工程与应用》 CSCD 北大核心 2010年第12期91-93,122,共4页 Computer Engineering and Applications
基金 国家自然科学基金No.70801036 No.70471017 教育部人文社科规划基金No.05JA630027~~
关键词 相关性漏洞 系统攻击 可靠性分析 风险评估 related vulnerability system attack reliability analysis risk assessment
  • 相关文献

参考文献6

二级参考文献30

  • 1孙钦东,刘遵雄,张德运.网络入侵防御技术研究[J].微电子学与计算机,2004,21(7):45-47. 被引量:4
  • 2黄光球,彭绪友,靳峰.基于密度的异常挖掘方法研究与应用[J].微电子学与计算机,2005,22(3):262-265. 被引量:8
  • 3杨为民 盛一兴.系统可靠性数字仿真[M].北京:北京航空航天大学出版社,1987.. 被引量:1
  • 4[1]Amoroso E G.Fundamentals of Computer Security Technology. Prentiee-Hall PTR,Upper Saddle River, NJ, 1994: 23-26 被引量:1
  • 5[2]Bishop M.Classifying Vulnerabilities. NISSC Panel on Vulnerabilities Data:The UC Davis Vulnerabilities Project, 1996.10 被引量:1
  • 6[3]Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies.CSE-96-11,1996.9 被引量:1
  • 7[4]Landwehr C E,Bull A R,McDermott J P et al.A Taxonomy of Computer Program Security Flaws.Information Technology Division,Naval Research Laboratory,Washington,D.C.,WA 20375-5337,1994 被引量:1
  • 8[5]Krsul I V.Software Vulnerability Analysis[D].Ph.D.Thesis.Purdue University,Computer Sciences Department, 1998 被引量:1
  • 9[3]Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies. Department of Computer Science at the University of California at Davis, 1996 被引量:1
  • 10[4]Aslam T,Krsul I.Use ofa Taxonomy of Security Faults. Eugene Spaff ord.In Proceedings of the 19th National Information Systems Security Conference,1996 被引量:1

共引文献93

同被引文献11

  • 1Boeing Company.The e-Enabled Advantage[EB].(2009-04-24). http ://www.boeing.com/commercial/aviationservices. 被引量:1
  • 2Federal Aviation Administration.14 CFR Part 25.Special Condi- tions:Boeing Model 787-8 Airplane;Systems and Data Net- works Security-Isolation or Protection from Unauthorized Passenger Domain Systems Access[R].USA:Federal Register, 2007. 被引量:1
  • 3Federal Aviation Administration.14 CFR Part 25.Special Condi- tions:Boeing Model 787-8 Airplane;Systems and Data Net- works Security-Protection of Airplane Systems and Data Net- works From Unauthorized External Access[R].USA: Federal Register, 2007. 被引量:1
  • 4Liao N, Li F, Song Y.Research on real-time network security risk assessment and forecast[C]//International Conference on Intelligent Computation Technology and Automation(ICICTA), Changsha, China, 2010,3 : 84-87. 被引量:1
  • 5Ben Mahmoud M S, Larrieu N.Pirovano A.A risk propagation base quantitative assessment methodology for network secu- rity[C]//Conference on Network and Information Systems Security(SAR-SSI) ,La Rochelle,France,2011 : 1-9. 被引量:1
  • 6ISO/IEC.Information technology-Security techniques Informa- tion security risk management.ISO/IEC 27005[R].USA:ISO/ IEC, 2011. 被引量:1
  • 7RTCA.Airworthiness Security PrOcess Specification.DO-326[R]. USA:RTCA,2010. 被引量:1
  • 8赵冬梅,刘金星,马建峰.基于改进小波神经网络的信息安全风险评估[J].计算机科学,2010,37(2):90-93. 被引量:21
  • 9吕俊杰,王元卓.信息安全风险模糊群决策评估方法[J].计算机工程与应用,2010,46(12):17-20. 被引量:11
  • 10张弢,慕德俊,任帅,姚磊.一种基于风险矩阵法的信息安全风险评估模型[J].计算机工程与应用,2010,46(5):93-95. 被引量:40

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部