首页 | 本学科首页   官方微博 | 高级检索  
     

信息系统漏洞挖掘技术体系研究
引用本文:张友春,魏强,刘增良,周颖.信息系统漏洞挖掘技术体系研究[J].通信学报,2011,32(2):42-47.
作者姓名:张友春  魏强  刘增良  周颖
作者单位:1. 北京科技大学信息工程学院,北京,100083
2. 解放军信息工程大学信息工程学院,河南郑州,450002
3. 解放军国防大学信指部,北京,100091
4. 北京市海淀区环境保护局,北京,100089
基金项目:国家自然科学重点基金资助项目,国家高技术研究发展计划("863"计划)基金资助项目
摘    要:首先讨论漏洞挖掘相关的术语定义,分析漏洞挖掘目标对象特点,研究漏洞挖掘的一般流程,然后利用层次结构模型方法,创造性地提出了5层漏洞挖掘技术体系架构模型,并详细描述基础层、抽象层、挖捌层、分析层和利用层的内容、作用及其相关支撑技术.最后指出漏洞挖掘技术的发展方向是兼顾各层、协同发展.

关 键 词:信息系统  漏洞挖掘  目标对象  体系架构  支撑性技术

Architecture of vulnerability discovery technique for information systems
ZHANG You-chun,WEI Qiang,LIU Zeng-liang,ZHOU Ying.Architecture of vulnerability discovery technique for information systems[J].Journal on Communications,2011,32(2):42-47.
Authors:ZHANG You-chun  WEI Qiang  LIU Zeng-liang  ZHOU Ying
Affiliation:ZHANG You-chun1,WEI Qiang2,LIU Zeng-liang3,ZHOU Ying4(1.College of Information Engineering,University of Science and Technology,Beijing 100083,China,2.College of Information Engineering,PLA Information Engineering University,Zhengzhou 450002,3.Information Department,PLA National Defense University,Beijing 100091,4.Beijing Haidian District Environmental Protection Agency,Beijing 100089,China)
Abstract:First,the definition of technical terms about vulnerability discovery were presented.The characters of the targets of vulnerability discovery were Analyzed.The general process of vulnerability discovery was studied.Then,by applying layer construction model way,proposed the architecture construction model of vulnerability discovery technique,which was divided into five layers,and also explained the contents,roles and key techniques of each layer.Finally,the future direction for the technique is that a compre...
Keywords:information system  vulnerability discovery  targets object  architecture construction  key technique  
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《通信学报》浏览原始摘要信息
点击此处可从《通信学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号