期刊文献+

基于网络的安全漏洞分类与扫描分析 被引量:5

Analysis for The Classification Scanner Method of Network Vulnerability
下载PDF
导出
摘要 在网络安全中漏洞扫描起着发现安全隐患的作用。文中介绍了网络安全漏洞的分类, 阐述了网络安全漏洞扫描原理,并在基于协议分类的基础上,结合各类漏洞的扫描,归纳了三种 主要的网络漏洞扫描方法。 In network security, the vulnerability scanner will find the hidden vulnerability. In this paper, the classifications of vulnerability and the principle of vulnerability scanner are introduced. Based on the protocol classification, and combined with the scanning of all kinds of vulnerabilities, three kinds of scan methods are introduced as well.
出处 《信息与电子工程》 2004年第4期318-320,共3页 information and electronic engineering
基金 国家自然科学基金(60372039)
关键词 计算机系统结构 安全漏洞分类 安全漏洞扫描 综述 网络协议 漏洞特征码 computer architecture vulnerability sort vulnerability scanning survey network protocol condition code
  • 相关文献

参考文献6

二级参考文献18

  • 1阎雪.黑客就这么几招[M].北京:万方数据电子出版社,2000..
  • 2程秉辉 John Hawke.黑客任务实战:攻略篇[M].北京:北京希望电子出版社,..
  • 3[3]Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies. Department of Computer Science at the University of California at Davis, 1996
  • 4[4]Aslam T,Krsul I.Use ofa Taxonomy of Security Faults. Eugene Spaff ord.In Proceedings of the 19th National Information Systems Security Conference,1996
  • 5[5]Krsul 0Software Vulnerability Analysis. Department of Computer Scie nces, Purdue University, 1998
  • 6[6]Knight E.Computer Vulnerabilities.http://www.securityparadigmcom/, 2000
  • 7[1]Denning D E.Cryptography and Data Security. Addison-Wesley Publis hing Company, 1983
  • 8[2]Marick B.A Survey of Software Fault Surveys. University of Illinois at rbana-Champaign, 1990
  • 9[2]绿色兵团. UNIX系统安全评估和监测工具[EB/OL]. http://202.102.240.75/linux/security/97.html,1999-12-09.
  • 10[1]Fyodor.Nmap网络安全扫描器说明(1,2).[EB/OL]http://oldhand. org/article/200204/20020400000278_1. xml.2002-04-12.

共引文献92

同被引文献34

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部