期刊文献+

威胁型安全域指标体系 被引量:3

Index System of Threat-based Security Domain
下载PDF
导出
摘要 对信息系统安全域的划分做了阐述,利用威胁树模型对信息系统进行威胁分析,得到了信息系统可能遭受的威胁源和威胁方式,并将《信息系统安全等级保护测评准则》中的安全测评项利用威胁方式进行分类,得到了威胁型安全域的度量指标,最后结合实例验证表明:该方法在安全域划分上能得到满意的结果,具有较好的实用性. This paper illustrates the division of an information system security domain, uses threat tree model to analyze the potential threat of an information system and obtains the source and mode of threat that may attack an information system. Also classifies the items in the Hierarchy Protection Standards for an Information System Security based on threat modes, and gets a magnanimity index system of the threat security domain. Finally, tests show that this method is satisfactory with the division of security doamin and possesses good practicality.
出处 《重庆工学院学报》 2007年第23期94-97,共4页 Journal of Chongqing Institute of Technology
关键词 等级保护 安全域 威胁树 hierarchy protection security domain threat tree
  • 相关文献

参考文献5

二级参考文献10

  • 1诸葛建伟,徐辉,潘爱民.基于面向对象方法的攻击知识模型[J].计算机研究与发展,2004,41(7):1110-1116. 被引量:7
  • 2[1]Toward a Secure System Engineering Methodology[A]. Proceedings Of New Security Paradigms Workshop[C]. September 1998.
  • 3[2]Schneier B. "Attack Trees",Secrets and Lies[M]. New York:John Wiley and Sons,2000. 318-333.
  • 4[3]Tidwell T,Larson R,Fitch K,et al. Modeling Internet Attacks[J]. IEEE,2001.
  • 5[4]Creating Secure Systems through Attack Tree Modeling[EB/OL]. www.amenaza.com,2003-02.
  • 6Amoroso E G. Fundamentals of Computer Security Technology.Englewood Cliffs(New Jersey): Prentice Hail, 1994.
  • 7Lindqvist U, Jonsson E. How to Systematically Classify Computer Security Intrusions. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press,1997:154-163.
  • 8Kendall K. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems[Master Thesis]. Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1999.
  • 9One A. Smashing the Stack for Fun and Profit. Phrack Magazine, 1996,7(49).
  • 10Spyrit D, Jack A B. Win32 Buffer Overflows (Location, Exploitation and Prevention). Phrack Magazine, 2000, 55(I5).

共引文献65

同被引文献24

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部