期刊文献+

IP多媒体子系统脆弱性评价技术研究

Research on evaluation of IMS vulnerability degree
在线阅读 下载PDF
导出
摘要 IP多媒体子系统(IMS)在带来网络融合以及业务提供能力增强的同时,也给基于IMS的下一代网络带来巨大的安全威胁,因而其脆弱性的研究工作受到广泛关注。借鉴了通用脆弱性评分系统(CVSS)的思想提取IMS脆弱性评估的指标,利用灰色理论建立了IMS脆弱性等级评价模型。构建了灰色理论的评价架构,列出了基于灰色理论的评分矩阵、三角权函数、灰色评价系数、权重矩阵、评价向量矩阵和评价结论值,为IMS脆弱性等级评定提供了科学依据。 IP Multimedia Subsystem(IMS) brings the networks integration and improves the services providing capability.However, as it deteriorates the IMS-based next generation network security,the research on its vulnerabilities receives extensive attention. The factors of IMS vulnerabilities are drawed by using CVSS and the evaluation mode of vulnerability degree is given based on gray-color theory.The fi'ame based on the gray-color theory is constructed,and the gray degree matrix,three angle weights,functions,gray-color evaluation coefficient,weight matrix,evaluation vector matrix and the evaluation conclusion value are introduced. This model can offer scientific basis for the evaluation of IMS vulnerability degree.
作者 徐群岭
出处 《计算机工程与应用》 CSCD 北大核心 2009年第18期89-90,100,共3页 Computer Engineering and Applications
基金 国家自然科学基金No.60575038~~
关键词 灰色理论 网络脆弱性 评价模型 gray-color theory network vulnerability evaluation model
  • 相关文献

参考文献6

  • 13GPP TS 33203 3G security,Access security for IP-based services[Z]. 2005-12.
  • 2Farmer D,Venema W.Vulnerability assessment franwork 1.1[M].New York: CIAO Publication, 2006 : 125-129.
  • 3Ramakrishnan C R,Sekar R.Survivability analysis of network specifications[C]//Workshop on Dependability Despite Malicious Faults. New York:CIAO Publication , 2005 :155-159.
  • 4Swiler L P.A graph based system for network vulnerability analysis [C]//Proceedings of the New Security Paradigms Workshop.New York: CIAO Publication, 2006: 71-79.
  • 5董良喜,王嘉祯.计算机网络脆弱性评价研究[J].计算机工程与应用,2003,39(20):157-160. 被引量:13
  • 6邓聚龙.灰色理论基础[M].武汉:华中科技大学出版社,2002..

二级参考文献5

  • 1KPMG Peat Marwick LLP.Vulnerability Assessment Framework 1.1[M]. CIAO publications, 1998.
  • 2Eric Knight.Computer Vulnerabilities[M].2000.
  • 3John R Sciandra.Holistic Vulnerability Assessment Methodologies. http ://www.nacon.com/papers/whitepaper.pdf, 2001.
  • 4Gary Stoneburner,Alice Goguen,Alexis Feringa.NIST Special Publication 800-30:Risk Management Guide for Information Technology System[M].WASHINGTON:U S GOVERNMENT PRINTING OFFICE, 2001.
  • 5ISS.Network and Host-based Vulnerability Assessment:A guide for information systems and network security professionals.http://documents.iss.net/whitepapers/nva.pdf, 2001.

共引文献341

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部