期刊文献+

恶意网络程序的危害性及对策研究 被引量:1

Study on harmfulness and counter measures of malicious network program
下载PDF
导出
摘要 恶意网络程序因其对计算机网络系统的巨大破坏作用而引起了人们的广泛关注。研究了恶意网络程序的本质特征,给出了恶意网络程序的定义。分别从功能特征和行为特征两个方面对网络恶意程序进行了分类研究。对恶意网络程序的危害性及其度量评估方法进行了深入分析研究。讨论了防范恶意网络程序的整体解决方案所需要考虑的因素,并提出了应对恶意网络程序的一般性原则。 The malicious network program is paid great attention on because of its tremendous effect on computer network security. Essentialcharacter of malicious network program is studied. A general definition ofmalicious network program is given. Categorizations of malicious network program are studied both from function character and behavior character. The harmfulness and its measurement and evaluation method of malicious network program are thoroughly analyzed. The factors considered on establishing a comprehensive scheme to solve the problem of malicious network program problem are discussed. The general counter measures to away keep malicious network program are also proposed.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第4期844-846,共3页 Computer Engineering and Design
基金 国家自然科学基金项目(60372039) 国家"十五"国防预研基金项目(41329080101)
关键词 信息安全 恶意网络程序 危害性分析 网络安全 information security malicious network program harmfulness analyze
  • 相关文献

参考文献8

  • 1Warren G.KruseⅡ,Jay G Heiser.计算机取证:应急响应精要[M].北京:人民邮电出版社,2003.
  • 2SchneierB.网络信息安全的真相[M].北京:机械工业出版社,2001.
  • 3闫强,陈钟,段云所,王立福.信息系统安全度量与评估模型[J].电子学报,2003,31(9):1351-1355. 被引量:31
  • 4Daniel Lowry Lough. A taxonomy of computer attacks with applications to wireless networks[D]. Virginia Polytechnic Institute and State University, 2001.
  • 5ISO/IEC 15408, Information technology-security techniquesevaluation criteria for IT security[S].
  • 6WarrenG KruseⅡ JayGHeiser.计算机取证:应急响应精要[M].北京:人民邮电出版社,2003.
  • 7Daniel Lowry Lough. A taxonomy of computer attacks with applications to wireless networks[D]. Virginia Polytechnic Institute and State University, 2001.
  • 8ISO/IEC 15408, Information technology-security techniques-evaluation criteria for IT security[S].

二级参考文献7

  • 1.GB 17859-1999.计算机信息系统安全保护等级划分准则[S].,1999..
  • 2Fran Nielsen. Approaches to Security Metrics[ R]. Gaithersburg: NIST,2000.
  • 3ACSA and MITRE Corp. Information system security attribution quantification or ordering[ A] .2001 1^st Workshop on Information System Security Scoring and Ranking Proceedings [ C ]. Virginia: ACSA and MITRE Corp, 2001.1 - 70.
  • 4Bennet S Yee. Security metrology and the monty hall problem[EB/OL].http://ww.cs.ucsd.edu/-bsy/pub/metrology.pdt,2001 -04-02.
  • 5DoD 5200.28-STD, Department of Defense Trusted Computer System Evaluation Criteria[S].
  • 6ISO/IEC 15408, Information Technology-Security Techniques-Evaluation Criteria For IT Security[S].
  • 7GB17859—1999.计算机信息系统安全保护等级划分准则[S].[S].,..

共引文献32

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部