期刊文献+

计算机弱点数据库综述与评价 被引量:8

Survey and Evaluation on Computer Vulnerability Database
下载PDF
导出
摘要 计算机弱点数据库已成为弱点研究的重要组成部分,对收集、存储和组织弱点信息具有重要意义。本文介绍了计算机弱点的定义及分类,分析并评价了现有的弱点数据库,最后讨论了其存在的问题以及将采取的技术路线。 Computer vulnerability database has been an important part of vulnerability research, and it is greatly significant for collecting, storing and organizing vulnerability information. This paper introduces the definition and taxonomy of computer vulnerabilities, analyzes and evaluates the present vulnerability databases, finally discusses the existing problems and the future research work.
出处 《计算机科学》 CSCD 北大核心 2006年第8期19-21,49,共4页 Computer Science
基金 国家自然科学基金(60TP3033) 国防十五预研项目(4131571)
关键词 网络安全 计算机脆弱性 安全漏洞 弱点分类法 弱点数据库 Network security, Computer vulnerability, Security flaw, Vulnerability taxonomy, Vulnerability database
  • 相关文献

参考文献40

  • 1ISC. Internet Domain Survey. Information from the web at http://www. isc. org/ds/, 2005
  • 2Michener J. System insecurity in the Internet age. IEEE Software, 1999,16 (4) : 62 -69
  • 3Bruce L. Managed Vulnerability Assessment ( MVA)-Improve Security By Understanding Your Own Vulnerabilities! Network Security, Elsevier Science, 2002 (4) : 8- 9
  • 4CERT/CC. 2005. CERT/CC Statistics 1988-2005. Information from the web at http://www. cert. org/stats/cert_ stats.html
  • 5CERT/CC. 2005. CERT/CC Electronic Crime. Information from the web at http://www. cert. org/about/ecrime, html .
  • 6CNCERT/CC. 2004. CNCERTCC Annual Report. Information from the web at http://www. cert. org. on/
  • 7Furnell S M, Warren M J. Computer abuse and cyber terrorism:The real threats in the New Millennium. Computers & Security,1999,18(1) :28-34
  • 8Cheswick W R,Bellovin S M. Firewalls and Internet Security: Repelling the Wily Hacker. Addison Wesley, 1994
  • 9Denning D E. Cryptography and Data Security. Addison-Wesley Publishing Company, 1983
  • 10Bishop M,Bailey D. A Critical Analysis of Vulnerability Taxonomies:[Tech. Rep. CSE-96-11]. Department of Computer Scienceat the University of California at Davis. Sep. 1996.

二级参考文献58

  • 1.计算机网络系统安全漏洞分类研究.www.xfocus.org.,.
  • 2[1]Amoroso E G.Fundamentals of Computer Security Technology. Prentiee-Hall PTR,Upper Saddle River, NJ, 1994: 23-26
  • 3[2]Bishop M.Classifying Vulnerabilities. NISSC Panel on Vulnerabilities Data:The UC Davis Vulnerabilities Project, 1996.10
  • 4[3]Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies.CSE-96-11,1996.9
  • 5[4]Landwehr C E,Bull A R,McDermott J P et al.A Taxonomy of Computer Program Security Flaws.Information Technology Division,Naval Research Laboratory,Washington,D.C.,WA 20375-5337,1994
  • 6[5]Krsul I V.Software Vulnerability Analysis[D].Ph.D.Thesis.Purdue University,Computer Sciences Department, 1998
  • 7[1]Brenton C. Active Defense[M]. San Francisco: SYBEX, 2001.
  • 8[2]Mann D.E., Christey S.M. Towards a Common Enumeration ofVulnerabilities[A/OL]. http://cve.mitre.org/docs/cerias.html. West Lafayette, Ind: Purdue University, 1999.
  • 9[3]Forristal J., Shipley G. Vulnerability Assessment Scanners[J/OL]. http://www.networkcomputing.com/1201/1201f1b2.html.Network Computing,2001,(1).
  • 10[3]Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies. Department of Computer Science at the University of California at Davis, 1996

共引文献198

同被引文献125

引证文献8

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部