期刊文献+

基于可靠性理论的分布式系统脆弱性模型 被引量:31

A Vulnerability Model of Distributed Systems Based on Reliability Theory
在线阅读 下载PDF
导出
摘要 对现有的脆弱性分析方法进行分析和比较,提出基于可靠性理论的分布式系统脆弱性模型.针对影响分布式系统安全性的各项因素进行脆弱性建模,利用模型检验方法构造系统的脆弱性状态图,描述系统脆弱性的完整利用过程,引入可靠性理论对分布式系统的脆弱性进行分析和量化评估,从而为增强分布式系统的安全性提供理论依据. After the analysis and comparison of the existing vulnerability analysis methods, a new vulnerability model of distributed systems based on reliability theory is proposed. First, it models vulnerabilities of distributed systems from the aspects of security-related factors. Then it utilizes the model checking method to build Vulnerability State Graph (VSG) of distributed systems to depict the complete process of exploitation of vulnerabilities. Finally, it introduces reliability theory to perform analysis and quantitative evaluation of vulnerabilities of distributed systems, which provides a theoretical evidence for security enhancement.
出处 《软件学报》 EI CSCD 北大核心 2006年第7期1633-1640,共8页 Journal of Software
基金 国家自然科学基金 国家重点基础研究发展规划(973)~~
关键词 分布式系统 脆弱性模型 脆弱性状态图 可靠性 可靠度函教 distributed system vulnerability model vulnerability state graph reliability reliability function
  • 相关文献

参考文献10

  • 1Dacier M,Deswarte Y,Kaaniche M.Quantitative assessment of operational security models and tools.Technical Report,96493,LAAS,1996.
  • 2Ortalo R,Deswarte Y.Information systems security:Specification and quantitative evaluation.Technical Report,DeVa ESPRIT Long Term Research Project No.20072,the 2nd Year Report,LAAS-CNRS & INRIA,1997.561-584.
  • 3Ortalo R,Deswarte Y,Ka(a)niche M.Experimenting with quantitative evaluation tools for monitoring operational security.IEEE Trans.on Software Engineering,1999,25(5):633-650.
  • 4Swiler LP,Phillips C,Gaylor T.A graph-based network-vulnerability analysis system.Technical Report,SANDIA Report No.SAND 97-3010/1,1998.
  • 5Sheyner O.Scenario graphs and attack graphs[Ph.D.Thesis].Pittsburgh:Carnegie Mellon University,2004.
  • 6Sheyner O,Haines J,Jha S,Lippmann R,Wing JM.Automated generation and analysis of attack graphs.In:Hinton H,Blakley B,Abadi M,Bellovin S,eds.Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2002.273-284.
  • 7Jha S,Sheyner O,Wing JM.Minimization and reliability analyses of attack graphs.Technical Report,CMU-CS-02-109,Carnegie Mellon University,2002.
  • 8Cimatti A,Clarke E,Giunchiglia F,Roveri M.NuSMV:A new symbolic model verifier.In:Halbwachs N,Peled D,eds.Proc.of the 11th Conf.on Computer-Aided Verification (CAV'99).LNCS 1633,Trento:Springer-Verlag,1999.495-499.
  • 9Gansner ER,North SC.An open graph visualization system and its applications to software engineering.Software-practice and Experience,1999,30(11):1203-1233.
  • 10蒋屹新,林闯,曲扬,尹浩.基于Petri网的模型检测研究.软件学报,2004,15(9):1265-1276.http://www.jos.org.cn/1000-9825/15/1265.htm

同被引文献379

引证文献31

二级引证文献440

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部