期刊文献+

信息系统安全漏洞研究 被引量:8

Reasearch on Information System Security Vulnerability
下载PDF
导出
摘要 信息系统安全漏洞是信息时代存在的一种客观对象,针对信息系统安全漏洞的研究对保护网络安全和信息安全有着重要意义。首先在国内外已有的研究基础上,提出系统地、全面地开展信息系统安全漏洞的研究。然后从信息系统管理角度和技术角度对漏洞做了区分,并且从信息系统安全漏洞存在的宿主和起因对其类型进行了分析,对信息系统安全漏洞的定义做了明确。最后从信息系统安全漏洞研究的主体、客体、行为和属性四个方面进行了论述,提出信息系统安全漏洞生命周期的概念,使信息系统安全漏洞的研究能够从标准规范、知识体系、关键技术与基础理论等多个方面有系统、有针对性的开展。 The information system security vulnerability exists objectively in the information age.It is of great importance to research on the information system security vulnerabilities for the protection of network security and information security.Based on the prior research,this paper proposes a method of studying the security vulnerabilities systematically and thoroughly.Vulnerabilities are classified from the perspective of management and technology.The types of vulnerabilities are analyzed according to their e...
作者 张涛 吴冲
出处 《哈尔滨工业大学学报(社会科学版)》 2008年第4期71-76,共6页 Journal of Harbin Institute of Technology(Social Sciences Edition)
基金 高等学校博士学科点基金(20050213037) 黑龙江省社会科学基金(05B0060) 国家哲学社会科学创新基地"技术.政策.管理(TPM)"项目
关键词 信息系统 信息安全 安全漏洞 information system information security security vulnerability
  • 相关文献

参考文献10

  • 1[1]Natinal Vulnerability Database.http://hvd.nist.gov/
  • 2[1]Common Vulerability Scoring System.http://www.first.org/cvss/cvss-dhs-12-02-04.pdf.
  • 3[1]DENNING D E.Cryptography and Data Security[M].North Reading,MA:Addison-Wesley Pub company,1982:33-45.
  • 4[2]AMOROSO E G.Fundamentals of Computer Security Technology[M].New Jersey:Prentice Hall,1994:22-25.
  • 5[3]LINDSKOG S,JONSSON E.Different Aspects of Security Problems in Network Operating Systems[G]//Proceedings of the Third Annual International Systems Security Engineering Association Conference.Florida,2002:2-3.
  • 6[4]KRSUL I.Software Vulnerability Analysis[D].West Lafayette:Department of Computer Science,Purdue University,1998.
  • 7邢栩嘉,林闯,蒋屹新.计算机系统脆弱性评估研究[J].计算机学报,2004,27(1):1-11. 被引量:84
  • 8[7]LONGLEY D,SHAIN M and CAELLI W.Information Security:Dictionary of Concepts,Standards and Terms[M].NewYork:Oxford University Press,1992:20-33.
  • 9[8]ASLAM T.A Taxonomy of Security Faults in the Unix Operating System[D].West Lafayette:Purdue University,1995.
  • 10[9]BISHOP M,BAILEY D.A Critical Analysis of Vulnerability Taxonomies[R].Technical Report 96-11,Department of Computer Science at the University of California.Davis,1996:3-5.

二级参考文献31

  • 1Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996
  • 2Longley D. , Shain M. , Caelli W.. Information Security: Dictionary of Concepts, Standards and Terms. New York: Macmillan, 1992
  • 3Beizer B.. Software Testing Techniques. 2nd edition. International Thomson Computer Press, 1990
  • 4Farmer D. , Spafford E. H.. The COPS security checker system. Purdue University, West Lafayette: Technical Report,Coast TR 94-01, CSD-TR-993, 1990
  • 5Baldwin R. W.. Kuang: Rule-based security checking. Programming Systems Research Group, Lab for Computer Science, MIT, Massachusetts: Technical Report, 1994
  • 6Zerkle D. , Levitt K. , NetKuang: A multi-host configuration vulnerability checker. In: Proceedings of the 6th USENIX Security Symposium, San Jose, CA, 1996
  • 7Porras P. A. , Kemmerer R. A.. Penetration state transition analysis: A rule-based intrusion detection approach. In: Proceedings of the Eighth Annual Computer Security Applications Conference, 1992, 220~229
  • 8Ilgun K.. USTAT: A real-time intrusion detection system for UNIX. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 16
  • 9Jensen K.. Colored petri nets: Basic concepts, analysis methods and practical use. vol. 1. 2nd edition. Berlin, Germany:Springer-Verlag, 1997
  • 10Kumar S.. Classification and detection of computer Intrusions [Ph. D. dissertation]. Department of Computer Science, Purdue University,West Lafayette, 1995

共引文献83

同被引文献153

引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部