首页 | 本学科首页   官方微博 | 高级检索  
     

脆弱性分类技术综述
引用本文:徐良华,史洪,朱鲁华.脆弱性分类技术综述[J].小型微型计算机系统,2006,27(4):627-633.
作者姓名:徐良华  史洪  朱鲁华
作者单位:1. 信息工程大学,信息工程学院,河南,郑州,450002;江南计算技术研究所,江苏,无锡,214083
2. 江南计算技术研究所,江苏,无锡,214083
摘    要:脆弱性是网络安全事件的根源.要全面分析脆弱性就必须研究脆弱性分类技术,因为分类是系统研究的基础.首先介绍了十九种主要分类方案;然后分析了每个方案的背景、目的、贡献和不足,并对各方案进行了对比分析,总结了现有分类方案的特点;最后提出了一个理想的分类标准.

关 键 词:脆弱性  分类  分类学  操作系统  安全
文章编号:1000-1220(2006)04-0627-07
收稿时间:01 4 2005 12:00AM
修稿时间:2005-01-04

Survey of Vulnerability Taxonomy Technology
XU Liang-hua,SHI Hong,ZHU Lu-hua.Survey of Vulnerability Taxonomy Technology[J].Mini-micro Systems,2006,27(4):627-633.
Authors:XU Liang-hua  SHI Hong  ZHU Lu-hua
Affiliation:1 Institute of Informatlon Engineering, Information Engineering University, Zhengzhou 450002, China; 2 Jiangnan Institute of Computing Technology, Wuxi 214083, China
Abstract:Vuinerability is the origin of network incident. It is need to research vulnerability taxonomy technology for the purpose of analyzing vulnerabilities completely, because the taxonomy is the foundation of system research. First, 19 principal taxonomy schemes were introduced; then the background, aim, achievement and limitation in every scheme were presented, and all schemes are compared and analyzed, and the characteristics of existing taxonomy schemes are summarized; Finally, a ideal taxonomy criterion is put forward.
Keywords:vulnerability  classification  taxonomy  operating system  security
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号