期刊文献+

网络攻击技术研究进展 被引量:16

A survey of the research on network attack technologies
在线阅读 下载PDF
导出
摘要 目的为网络攻击技术研究策略提供文献依据。方法文献综合分析。结果网络攻击主要分为口令攻击、入侵攻击、协议漏洞攻击、欺骗攻击、拒绝服务攻击、木马、缓冲区溢出攻击等;攻击研究工作主要有针对攻击模型、攻击分类、具体攻击原理、攻击发现技术、攻击的响应防御策略、网络攻击效果评估技术研究等。结论未来5至10年,网络攻击技术研究将主要围绕攻击模型描述、攻击发现与防御、攻击响应策略、攻击演化、攻击技术有效性评估等方向展开。研究的重点应为蠕虫和木马。 Aim Provide a literature basis for research strategy of the network attack technology. Methods Literature analysis. Results Network attacks include password attack, invasion, protocol loophole attack, Trojan horse, buffer overflow attack, and so on. The research on network attack aims mostly at the attack models and prototypes, attack categorizing, attack detecting techniques, attack responding and defending, as well as evaluating the impact of attack. Conclusion In the next 5 to 10 years, the research on network attack' will mainly focus on the fields such as description of attack model, attack detecting and defending, strategy of attack responding, attack evolvement, and evaluating the effect of attack, with the emphasis on Worms and Trojans.
出处 《西北大学学报(自然科学版)》 CAS CSCD 北大核心 2007年第2期208-212,共5页 Journal of Northwest University(Natural Science Edition)
基金 陕西省自然科学基金项目项目(2003F20) 陕西省教育厅产业化重点基金资助项目(05JC27) 西北大学科学研究基金资助项目(04NW41)
关键词 网络攻击 入侵检测 攻击响应策略 network attack Intrusion detection attack response strategy
  • 相关文献

参考文献39

二级参考文献193

  • 1WRStevens G R Wright 陆雪莹等译.Wright,TCP/IP详解卷2:实现[M].北京:机械工业出版社,2000..
  • 2WRStevens 范建华等译.TCP/IP详解卷1:协议[M].北京:机械工业出版社,2000..
  • 3T Tidwell,R Larson,K Fitch et al.Modeling Internet Attacks[C].In:Proceedings of the 2001 IEEE Workshop on Information Assurance and Security,2001:54~59
  • 4Michael Spibey J.The Z notation:a reference manual[M].2nd edition,Prentice Hall,1992
  • 5Reduce,Grosse,G Smith.Object-Z:a specification language advocated for the description of standards[S].Computer Standards and Interfaces,1995:511~533
  • 6[1]Larry Rogerst.Buffer Overflow-What Are They and What Can I Do Them?[EB/OL].http:∥www.cert .org/homeusers/buffer_overflow.html,2003
  • 7[2]David Evans,David Larochelle.Improving Security Using Extensible Lightweight Static Analysis[J].IEEE Software,2002
  • 8[3]David Evans. Splint Manual[EB/OL].http:∥www.splint.org/manual,2003
  • 9[4]Nurit Dor,Michael Rodeh,Mooly Sagiv. Cleanness Checking of String Manipulations in C Programs via Integer Analysis[C].In:Proceeding of the 8th Symposium on Static Analysis,2001
  • 10[5]David Wanger,Jeffery S Foster,Eric A Brewer et al.A First Step Toward Authomated Detection of Buffer Overrun Vulnerabilities[C].In:the Network and distributed system security symposium,2000-02

共引文献498

同被引文献81

引证文献16

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部