期刊文献+

一种重要信息系统安全深度测评技术分析

Analysis of Depth Assessment of Information System Security Technology
下载PDF
导出
摘要 文章首先针对当前等级保护测评在有效安全性方面存在的问题进行分析,引出信息系统安全深度测评概念;其次分析深度测评所涉及到的脆弱性信息深度发现与挖掘、安全行为深度分析、海量数据深度学习等核心技术,为重要信息系统测评工作的开展提供一种新的工作思路。 The paper analyzed the present situation of classified protection and security assessment, and put forward a new concept of information system security depth assessment technology. Pointed out and analyzed depth assessment four key technologies related to vulnerability information depth found, safe behavior depth analysis, data depth learning and data depth extracting, which offers a new way to carry out the work of important information system security assessment.
出处 《信息网络安全》 2013年第10期130-131,共2页 Netinfo Security
基金 河南省科技攻关计划项目[112102310368] 河南省教育厅科技攻关项目[12B520073]
关键词 信息系统 等级保护 有效安全 深度测评 information system classified protection effective security depth assessment
  • 相关文献

参考文献13

  • 1夏冰,席丽萍,李瑞华,郑秋生.面向有效性研判的终端安全深度测评技术[J].保密科学技术,2012(11):57-60. 被引量:1
  • 2中国信息安全等级保护网.公安部在京召开2013年信息安全等级保护工作形势报告会[EB/OL].http://www.djbh.net/webdev/web/HomeWebAction.do?p=getZxdt&id=ff8080813cf6lcla013ebIbda9f4003d&xx=bf5319f4dladlc88aeoe35606ea37f992013-05-17. 被引量:1
  • 3国家信息安全等级保护工作协调小组办公室.全国等级保护测评机构推荐目录[EB/OL].http://www.djbh.net/webdev/web/QueryCpjfraction.do?p=getlistSearchQueryCpjg.2013-06-14. 被引量:1
  • 4贾炜,连一峰,冯登国,陈思思.基于贝叶斯网络近似推理的网络脆弱性评估方法[J].通信学报,2008,29(10):191-198. 被引量:13
  • 5DACIER M, DESWARTE Y, KAANICHE M. Quantitative Assessment of Operational Security Models and Tools[R]. 96493,LAAS, May 1996. 被引量:1
  • 6PHILLIPS C, SWILER J. A graph-based system for network vulnerability analysis[A]. Proceedings of the New Security Paradigms Workshop[C]. Charlottesville, VA, 1998.71-79. 被引量:1
  • 7RITCHEY R, AMMANN P. Using model checking to analyze network vulnerabilities[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Oakland, CA, 2001. 156-165. 被引量:1
  • 8SHEYNER O, HAINES J, JHA S, et al. Automated generation and analysis of attack graphs[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Berkeley, CA, 2002. 被引量:1
  • 9SHEYNER O, WING J M. Tools for generating and analyzing attack graphs[A]. Proceedings of Workshop on Formal Methods for Components and Objects[C]. Tehran, Iran, 2004. 344. 被引量:1
  • 10冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:30

二级参考文献25

  • 1陈龙,王国胤.计算机取证技术综述[J].重庆邮电学院学报(自然科学版),2005,17(6):736-741. 被引量:48
  • 2冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:30
  • 3Dixon P D. An Overview of Computer Forensics[J]. IEEE Potentials,2005, 24(5): 7-10. 被引量:1
  • 4Dacier M,Deswarte Y,Kaaniche M.Quantitative assessment of operational security models and tools.Technical Report,96493,LAAS,1996. 被引量:1
  • 5Ortalo R,Deswarte Y.Information systems security:Specification and quantitative evaluation.Technical Report,DeVa ESPRIT Long Term Research Project No.20072,the 2nd Year Report,LAAS-CNRS & INRIA,1997.561-584. 被引量:1
  • 6Ortalo R,Deswarte Y,Ka(a)niche M.Experimenting with quantitative evaluation tools for monitoring operational security.IEEE Trans.on Software Engineering,1999,25(5):633-650. 被引量:1
  • 7Swiler LP,Phillips C,Gaylor T.A graph-based network-vulnerability analysis system.Technical Report,SANDIA Report No.SAND 97-3010/1,1998. 被引量:1
  • 8Sheyner O.Scenario graphs and attack graphs[Ph.D.Thesis].Pittsburgh:Carnegie Mellon University,2004. 被引量:1
  • 9Sheyner O,Haines J,Jha S,Lippmann R,Wing JM.Automated generation and analysis of attack graphs.In:Hinton H,Blakley B,Abadi M,Bellovin S,eds.Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2002.273-284. 被引量:1
  • 10Jha S,Sheyner O,Wing JM.Minimization and reliability analyses of attack graphs.Technical Report,CMU-CS-02-109,Carnegie Mellon University,2002. 被引量:1

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部