期刊文献+

攻击技术分类研究 被引量:23

Research on Classification of Attack Technologies
在线阅读 下载PDF
导出
摘要 以系统化构建一个为入侵检测与防御提供知识基础的攻击知识库为目标,从攻击者角度出发对攻击技术进行了分类研究,提出了一种符合分类标准的攻击技术分类层次结构,并概述了每种不同的攻击技术。 For the goal to systemize an attack knowledge base which provides knowledge for intrusion detection and prevention, the classification of attack technologies is researched from the point of view of attackers, and a classification taxonomy which accords with the classification criterions is proposed, furthermore, each type of attack technology is introduced in summary.
出处 《计算机工程》 CAS CSCD 北大核心 2005年第21期121-123,126,共4页 Computer Engineering
关键词 网络安全 攻击 分类 Network security Attack Classification
作者简介 诸葛建伟(1980-),男,博士生,主研方向:攻防知识建模,入侵检测与防御。E-mail:zhugejianwei@icst.pku.edu.cn 叶志远,高工。 邹维,教授。
  • 相关文献

参考文献6

  • 1诸葛建伟,徐辉,潘爱民.基于面向对象方法的攻击知识模型[J].计算机研究与发展,2004,41(7):1110-1116. 被引量:7
  • 2Amoroso E G. Fundamentals of Computer Security Technology.Englewood Cliffs(New Jersey): Prentice Hail, 1994.
  • 3Lindqvist U, Jonsson E. How to Systematically Classify Computer Security Intrusions. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press,1997:154-163.
  • 4Kendall K. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems[Master Thesis]. Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1999.
  • 5One A. Smashing the Stack for Fun and Profit. Phrack Magazine, 1996,7(49).
  • 6Spyrit D, Jack A B. Win32 Buffer Overflows (Location, Exploitation and Prevention). Phrack Magazine, 2000, 55(I5).

二级参考文献12

  • 1M Roesch,C Green.Snort users manual(2.1.2).http://www.snort.org/docs/,2004-03-31/2004-04-19
  • 2S T Eckmann,G Vigna,R A Keerer.STATL:An attack language for state-based intrusion detection.Journal of Computer Security,2002,10(1):71~104
  • 3G Vigna,R A Kemmerer.NetSTAT:A network-based intrusion detection system.Journal of Computer Security,1999,7(1):37~71
  • 4S Kumar,E H Spafford.A pattern matching model for misuse intrusion detection.The 17th National Computer Security Conf,Baltimore,MD,USA,1994
  • 5B Schneier.Attack trees,modeling security threats.Dr Dobb's Journal of Software Tools,1999,24(12):21~29
  • 6K Daley,R Larson,J Dawkins.A structural framework for modeling multi-stage network attacks.The Int'l Conf on Parallel Processing Workshops,Vancouver,B C,Canada,2002
  • 7S J Templeton,K Levitt.A requires/provides model for computer attacks.The New Security Paradigms Workshop,Cork Ireland,2000
  • 8F Cuppens,R Ortalo.Lambda:A language to model database of detection of attacks.In:Proc of the 3rd Int'l Workshop on the Recent Advances in Intrusion Detection,LNCS 1907.New York:Springer,2000.197~216
  • 9C Michel,L M'e.ADeLe:An attack description language for knowledge-based intrusion detection.In:Proc of the 16th Int'l Conf on Information Security.Dordrecht,Holland:Kluwer,2001.353~368
  • 10邵维忠,杨芙清.面向对象的系统分析.北京:清华大学出版社,1998(Shao Weizhong,Yang Fuqing.Object-Oriented System Analysis(in Chinese).Beijing:Tsinghua University Press,1998)

共引文献6

同被引文献110

引证文献23

二级引证文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部