期刊文献+

基于访问控制权限的网络节点安全评估方法 被引量:1

The Security Evaluation Method of Network Node Based on the Access Control Private
在线阅读 下载PDF
导出
摘要 网络安全评估的难点在于如何选择和分析各种影响网络安全的因素及其属性。文章提出一种新的思路和评估方法,即从影响计算机安全的众多复杂因素中选取起关键作用的用户访问权限作为评估因素,通过对影响用户访问权限的漏洞进行定性、定量的分析,得出节点失去控制权限的途径总数和风险系数,评估网络节点的安全状况。 The difficulty of network security evaluation is how to select and analyze the factors and their attributes,which are highly important to network security.In this paper,access control private is selected as evaluated attribute.It proposes a new method which adopts matrix to analyze the attributes of vulnerabilities to evaluate qualitatively and quantitatively the security status of network node.The total paths and risk index of the node losing its power control are obtained by this method.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第23期155-157,229,共4页 Computer Engineering and Applications
关键词 网络安全 评估 访问控制权限 漏洞 用户访问权限 风险分析 网络节点 network security,evaluation,access control private,vulnerability
  • 相关文献

参考文献10

  • 1Rodolphe Ortalo,Yves Deswarte,Mohamed Kaaniche.Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security[J].IEEE Transactions on Software Engineering,1999;25(5):633~650
  • 2Erland Jonsson,Tomas Olovsson.A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior[J].IEEE Transactions on Software Engineering,1997;23(4):235
  • 3Bharat B Madan,Katerina Goiseva-Popstojanova,Kalyanaraman Vaidyanathan.Modeling and quantification of security attributes of software systems[C].In:Dependable Systems and Networks,Proceedings International Conference on,2002:505~514
  • 4Oleg Sheyner,Joshua Haines,Somesh Jha et al.Automated generation and analysis of attack graphs[C].In:Security and Privacy,Proceedings,2002 IEEE Symposium,2002:254~265
  • 5Somesh Jha,Oleg Sheyner,Jeannette M Wing.Two formal analyses of attack graphs[C].In:Computer Security Foundations Workshop,Proceedings 15th IEEE,2002;24~26:49~63
  • 6Richard H Baker.Computer Security Handbook[M].2nd Editon,TAB Professional and Reference Books,McGraw-Hill Inc,ISBN 0-8306-7592-2,1991
  • 7Peter G Neumann.Computer System Security Evaluation[C].In:National Computer Conference Proceedings,1978:1087~1095
  • 8R P Abbott,J S Chin,J E Donnelley et al.Security Analysis and Enhancements of Computer Operating Systems[S].Institute for Computer Sciences and Technology,National Bureau of Standards,NBSIR,1976:76~1041
  • 9Computer Emergency Response Team.http://www.cert.org/nav/index_red.html,2003
  • 10Kelly Martin.Multiple Vendor Telnetd Buffer Overflow Vulnerability[EB/OL].http://securityfocus.com/bid/3064,2003-01

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部