期刊文献+

一种新型网络安全评估系统研究 被引量:1

Research on a New Network Security Assessment System
下载PDF
导出
摘要 通过对国内外现有的脆弱性评估系统的研究,综合了基于网络和基于主机的两种扫描系统的优点,提出一种改进架构的网络安全评估系统(Improved Network Security Assessm ent System,INSAS)。本系统旨在探测已知的安全漏洞,对网络主机的安全等进行有效的检查。通过实验室内网段上的扫描实验表明了INSAS在运行效率和对网络带宽的影响上,均优于现有的扫描系统。 Based on the research of domestic and foreign vulnerability assessment systems, in this paper , we propose an improved network security assessment system (INSAS). It integrates the advantages of both host based and network based scan system. Our goal is to explore the known security vulnerabilities,and to check hosts' security effectively as well . The result of scanning experiment in lab shows superiorities of INSAS in operation efficiency and fewer impacts on network bandwidth.
出处 《南京邮电大学学报(自然科学版)》 EI 2006年第3期27-32,共6页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
关键词 网络安全 脆弱性扫描 插件技术 Network security Vulnerability scan Plug-in technique
  • 相关文献

参考文献18

  • 1LONGLEY D, SHAIN M, CAELLI W. Information Security :Dictionary of Concepts , Standards and Terms[M]. New York : Macmillan, 1992.
  • 2邢栩嘉,林闯,蒋屹新.计算机系统脆弱性评估研究[J].计算机学报,2004,27(1):1-11. 被引量:84
  • 3TIAN H T, HUANG L S, ZHOU Z, et al. Ann up Administrators:Automated Vulnerability Management in Parallel Architectures[C]//Proceedings of 7th International Symposium on Algorithms and Networks. May 2004:587 -593.
  • 4TENABLE. Nessus vulnerability scanner [ EB/OL ]. http ://www.nessus. org
  • 5ISS. Proventia Network Enterprise Scanner[EB/OL]. http ://www.iss. net/products_services/enterprise_protection/vulnerability _assessment/enterprise_ scanner, php
  • 6BISHOP M, BAILEY D. A critical analysis of vulnerability taxonomies [ R ]. California: Departiment of Computer Science, University of California, 1996.
  • 7JENSEN K. Colored petri nets : Basic concepts , analysis methods and practical use[ M]. Berlin:Springer-verlay, 1994.
  • 8HELEN J W, GUO Chuanxiong, DANIEL R S, et al. Shield: Vulnerability Driven Network Filters for Preventing Known Vulnerability Exploits[ C]//Proceedings of the 2004 conference on Applications,technologies, architectures, and protocols for computer communications. 2004, 34(4) :193 -204.
  • 9RITCHEY R W , AMMANN P. Using model checking to analyze network vulnerabilities [ C ]//Proceedings of 2000 IEEE Symposium on Security and Privacy. Oakland , CA , 2000:156 -165.
  • 10CYNTHIA P, LAURA P S. A graph-based system for network-vulnerability analysis [ C ]//Proceedings of the 1998 workshop on New security paradigms. 1998:71 -79.

二级参考文献31

  • 1Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996
  • 2Longley D. , Shain M. , Caelli W.. Information Security: Dictionary of Concepts, Standards and Terms. New York: Macmillan, 1992
  • 3Beizer B.. Software Testing Techniques. 2nd edition. International Thomson Computer Press, 1990
  • 4Farmer D. , Spafford E. H.. The COPS security checker system. Purdue University, West Lafayette: Technical Report,Coast TR 94-01, CSD-TR-993, 1990
  • 5Baldwin R. W.. Kuang: Rule-based security checking. Programming Systems Research Group, Lab for Computer Science, MIT, Massachusetts: Technical Report, 1994
  • 6Zerkle D. , Levitt K. , NetKuang: A multi-host configuration vulnerability checker. In: Proceedings of the 6th USENIX Security Symposium, San Jose, CA, 1996
  • 7Porras P. A. , Kemmerer R. A.. Penetration state transition analysis: A rule-based intrusion detection approach. In: Proceedings of the Eighth Annual Computer Security Applications Conference, 1992, 220~229
  • 8Ilgun K.. USTAT: A real-time intrusion detection system for UNIX. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 16
  • 9Jensen K.. Colored petri nets: Basic concepts, analysis methods and practical use. vol. 1. 2nd edition. Berlin, Germany:Springer-Verlag, 1997
  • 10Kumar S.. Classification and detection of computer Intrusions [Ph. D. dissertation]. Department of Computer Science, Purdue University,West Lafayette, 1995

共引文献83

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部