[1]倪评福,吴作顺.网络脆弱性分析方法的研究[J].计算机技术与发展,2013,(04):126-130.
 NI Ping-fu,WU Zuo-shun.Research on Analysis Methods of Network Vulnerability[J].,2013,(04):126-130.
点击复制

网络脆弱性分析方法的研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2013年04期
页码:
126-130
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Research on Analysis Methods of Network Vulnerability
文章编号:
1673-629X(2013)04-0126-05
作者:
倪评福1吴作顺2
[1]西安通信学院;[2]中国电子设备系统工程研究所
Author(s):
NI Ping-fuWU Zuo-shun
关键词:
网络安全分析脆弱性Petri网
Keywords:
network security analysisvulnerabilityPetri nets
文献标志码:
A
摘要:
网络脆弱性分析是网络安全分析和风险评估的重要组成部分.网络脆弱性分析方法的发展经历了从人工分析到自动分析的阶段,在自动化分析阶段,基于网络扫描的脆弱性分析发展得到了很大的进步.为了方便网络脆弱性的分析,提出了基于模型的分析方法,提出的各种基于模型的脆弱性分析方法从不同的角度入手,具有各自的优势.为了全面、准确地分析目标网络,必须考虑整个系统作为一个动态和分布式的特点,基于模型的分析方法可以分析整个网络,并可以利用强大的数学工具
Abstract:
Vulnerability analysis of network is an important part of network security analysis and risk assessment. Vulnerability analysis of network has experienced the stage from the manual to the automatic. In the automatic analysis stage,the scan-based vulnerability analysis methods have been well advanced. In order to be convenient for vulnerability analysis of network,the model-based analysis has been pro-posed. Many model-based vulnerability analysis methods start with different angles and have respective advantages. To make the result comprehensive and accurate,the target of analysis must be considered as a whole system with dynamic and distributed features. Model-based methods can analyse a whole network,and can use powerful mathematic tools

相似文献/References:

[1]朱俚治. 基于MMTD的水印鲁棒性研究[J].计算机技术与发展,2014,24(09):141.
 ZHU Li-zhi. Research on Watermarking Robust Based on MMTD[J].,2014,24(04):141.
[2]董雨良,董 博,秦晓军,等.基于重点变异区域智能识别的模糊测试技术[J].计算机技术与发展,2019,29(09):55.[doi:10. 3969 / j. issn. 1673-629X. 2019. 09. 011]
 DONG Yu-liang,DONG Bo,QIN Xiao-jun,et al.Fuzzing Testing Technology of Intelligent Recognition Based on Key Mutation Regions[J].,2019,29(04):55.[doi:10. 3969 / j. issn. 1673-629X. 2019. 09. 011]

更新日期/Last Update: 1900-01-01