期刊文献+

从OVAL漏洞信息转换到Nessus扫描插件的研究与实现 被引量:1

Research and Implementation of Transforming from the Vulnerability Information of OVAL to Scanning Plugins of Nessus
在线阅读 下载PDF
导出
摘要 网络安全漏洞扫描应充分考虑执行的效率和信息的共享。本文通过对OVAL和Nessus的介绍,分析O- VAL Definition与Nessus plugin之间的异同,提出并实现了一种将OVAL公布的漏洞信息转换成Nessus扫描插件的方法,共享了漏洞信息,并提升了漏洞检测的品质。最后经过实验说明该方法的可行性。
出处 《计算机系统应用》 2007年第11期27-31,共5页 Computer Systems & Applications
基金 北京市教委科技发展计划项目(KM200610772006)
  • 相关文献

参考文献7

  • 1RENAUD DERAISON. Nessus network auditing [ M ]. Syngress Publishing ? 2004 (508 pages).
  • 2M. WOJCIK, D. PROULX, J. BAKER, R. ROBERGE. Introduction to OVAL-A language to determine the presence of computer vulnerabilities and configuration issues. The MITRE Corporation, 2005.
  • 3Common Vulnerabilities and Exposures URL: http:// cve. mitre, org/.
  • 4OVAL URL: http ://oval. mitre, org/.
  • 5Nessus Vulnerability Scanner URL : http ://www. nessus. org/index, php.
  • 6肖晖,张玉清.Nessus插件开发及实例[J].计算机工程,2007,33(2):241-243. 被引量:9
  • 7SCAMBRAY J,MCCLURE S,KURTZ G.网络安全机密与解决方案[M].杨继张译.北京:清华大学出版社,2000.

二级参考文献3

  • 1Renaud D,Ron G.A Complete Analysis of Your Security Level[Z].2005.http://www.nessus.org/features/index.php.
  • 2Renaud D.The Nessus Attack Scripting Language Reference Guide[Z].2005-01-03.http://ftp.intevation.de/boss/doc/nasl_guide-20050103.pdf.
  • 3Jay B,Haroon M,Roelof T,et al.Nessus Network Auditing[M].Syngress Publishing,2004.

共引文献8

同被引文献9

  • 1The MITRE Corporation. OVAL [EB/OL]. (2007-09-10)[2008-01-17].http://oval.mitre.org/.
  • 2Alhazmi O H, Malaiya Y K. Modeling the vulnerability discovery process [C]// Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering. Washington, DC, USA: IEEE Computer Society, 2005:129-138.
  • 3Michitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata. Development of security scanner with high usability [C]// Proceedings of the 18th International Conference on Advanced Information Networking and Application. Washington, DC, USA: IEEE Computer Society, 2004: 139.
  • 4Internet Security Systems TM. Vulnerability assessment [EB/OL]. (2004-03-15)[2007-09-20].http://www.iss.net/.
  • 5Southwest Research Institute. Nessus [EB/OL]. (2007-04-25)[2007-12-19]. http://www.nessus.org/nessus.
  • 6简哲民.OVAL的CVE到Nessus Scripts-从弱点特征到Nessus Scripts[D].中国台湾:逢甲大学资讯电机学院,2006.
  • 7The MITRE Corporation. CVE [EB/OL].(2007-05-09)[2007-11-26]. http://cve.mitre.org/.
  • 8陈秀真,李建华.基于OVAL的新型漏洞评估系统[J].小型微型计算机系统,2007,28(9):1554-1557. 被引量:8
  • 9马恒太,蒋建春,陈伟锋,卿斯汉.基于Agent的分布式入侵检测系统模型[J].软件学报,2000,11(10):1312-1319. 被引量:122

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部