计算机系统脆弱性评估研究  被引量:84

A Survey of Computer Vulnerability Assessment

在线阅读下载全文

作  者:邢栩嘉[1] 林闯[1] 蒋屹新[1] 

机构地区:[1]清华大学计算机科学与技术系,北京100084

出  处:《计算机学报》2004年第1期1-11,共11页Chinese Journal of Computers

基  金:国家"九七三"重点基础研究发展规划项目(G19990 3 2 70 7);国家"八六三"高技术研究发展计划项目(2001AA112 0 80 );国家自然科学基金(90 10 40 0 2;60 173 0 12 )资助

摘  要:在计算机安全领域 ,特别是网络安全领域 ,对计算机系统进行脆弱性评估十分重要 ,其最终目的就是要指导系统管理员在“提供服务”和“保证安全”这两者之间找到平衡 .脆弱性评估方法的发展经历了从手动评估到自动评估的阶段 ,现在正在由局部评估向整体评估发展 ,由基于规则的评估方法向基于模型的评估方法发展 ,由单机评估向分布式评估发展 .该文阐述了脆弱性评估所要解决的问题 。Computer vulnerability assessment has experienced the stage of manual to automatic. It’s now expanding from partial assessment to holistic, from rule based to model based, from single host to distributed. In the applications of computer security, assessing network’s vulnerabilities is usually required. To make the result comprehensive and accurate, the target of assessment must be considered as a whole system with dynamic and distributed features. The system is holistic both in time and space. The security of network system should be ensured as a whole all along rather than some host at sometime. The rule based assessing methods have been well studied. This is the base of the model based methods. At the same time, the model based methods have made rapid progress. Many model based methods start with different angles and have different advantages. For example, the Requires/Provides model can be suitable for attack generation and intrusion detection. Ritchey’s model is more efficient for describing the exploitation of well known network vulnerabilities than other models. Ramakrishnan’s model is fit for analyzing system vulnerabilities from local host.Further researches could focus on the following aspects: to build new models, to refine the existing models or the analyzing methods. Such three aspects are not completely independent. When building or refining a model, the factors relevant to security of actual systems could be added to the model step by step so that the model can solve actual problems more powerfully. Many methods might be introduced to analyze a security model,such as temporal logic, CPN and SHLPN (stochastic High level Petri net). And these can provide powerful mathematic tools for formal analysis of security models.

关 键 词:网络安全 计算机网络 计算机安全 计算机病毒 计算机系统 脆弱性评估 

分 类 号:TP393.08[自动化与计算机技术—计算机应用技术] TP309.5[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象