检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:劳雪松[1] LAO Xuesong(Anhui Vocational College of Police Officers,Hefei Anhui 230031,China)
出 处:《信息与电脑》2023年第14期226-228,共3页Information & Computer
摘 要:网络安全评估系统能否发挥作用,很大程度上取决于其是否能够精准识别安全漏洞。首先,从网络流表项、网络信息评估、网络安全漏洞自动检测3个方面,分析基于人工智能的漏洞检测技术;其次,分析安全评估系统的模型结构,包括插件库、漏洞库、客户端信息库、漏洞补丁库、中央控管调度中心及客户端;最后,分析网络安全评估系统的工作原理及插件量化步骤。该系统能够根据风险变化情况实时调整插件调度策略,具有一定的应用价值。The effectiveness of a network security assessment system largely depends on its ability to accurately identify security vulnerabilities.Firstly,the vulnerability detection technology based on artificial intelligence is analyzed from three aspects:flow network table entry,network information evaluation,and automatic detection of network security vulnerabilities.Secondly,analyze the model structure of the security assessment system,including plugin library,vulnerability library,client information library,vulnerability patch library,central control and scheduling center,and client.Finally,analyze the working principle and plugin quantification steps of the network security evaluation system.This system can adjust plugin scheduling strategies in real-time based on risk changes,and has certain application value.
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7