期刊文献+

兼容OVAL的多平台VAS设计与实现 被引量:2

Design and implementation of OVAL-compatible VAS on multi-platform
在线阅读 下载PDF
导出
摘要 针对不同厂商安全软件之间的信息表示格式差异带来的软件联动问题,以及一个网络内通常存在多种平台主机的现状,提出一种"管理者/代理"架构的、兼容OVAL的多平台VAS(弱点评估系统)。系统以OVAL作为弱点评估标准,以轻量级Web server为通讯手段,支持多平台主机弱点评估,在保证评估高精度的同时,支持与OVAL兼容的其他安全软件共享安全数据,具有更高的评估完备性和功能扩展性。 Aiming at the flaws of current interoperability problem brought by different information expressing standards between different security products and present situation that a network generally includes several kinds of platforms,a design of manager/ agent architecture-based,OVAL-compatible multi-platform Vulnerability Assessment System(VAS) is given.This system takes OVAL as vulnerability assessment standard and takes lightweight Web server as communicating measure.It supports multi-platform vulnerability assessment and sharing security data with other OVAL-compatible tools with high accuracy,assessing completeness and functional expansibility.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第36期82-85,共4页 Computer Engineering and Applications
基金 国家科技支撑计划项目No.2007BAH08B01 陕西省自然科学基金No.2005f36~~
关键词 联动 多平台 弱点评估系统 开放弱点评估语言 interoperability multi-platform Vulnerability Assessment System(VAS) Open Vulnerability and Assessment Language (OVAL)
  • 相关文献

参考文献10

  • 1A complete report of all of the statistics CERT has available cataloged vulnerabilities[EB/OL]. (2007 -04-30 ).http://www.cert.org/stats/ fullstats.html.
  • 2Glossary of terms used in security and intrusion deteetion[EB/OL]. ( 2008-07-20 ).http://www.sans.org/resources/glossary.php.
  • 3邢栩嘉,林闯,蒋屹新.计算机系统脆弱性评估研究[J].计算机学报,2004,27(1):1-11. 被引量:84
  • 4段丹青,陈松乔,杨卫平.漏洞扫描与入侵检测联动系统的研究[J].计算机应用研究,2007,24(7):128-130. 被引量:9
  • 5An introduction to the OVAL language[EB/OL].(2007-07-11).http://oval.mitre.org/ovaVdocuments/docs-06/an_introduction_to_the_oval_language.pdf.
  • 6CVE-Common Vulnerabilities and Exposures[EB/OL].(2008-07-20). http ://eve.mitre.org.
  • 7An introduction to OVAL compatibility[EB/O L]. ( 2006-07-16 ).http :// oval. mitre.org.
  • 8Network security scanning,patch management vulnerability management[EB/OL].(2008-05-15 ).http://www.gfi.com/lannetscan.
  • 9Red Hat announces OVAL security compatibility[EB/OL].(2008-07- 24 ).http://www.redhat.com/about/news/prarchive/2006/oval mitre.html.
  • 10Martin R A.Transformational vulnerability management through standards[C]//Systems & Software Technology Conference,2005.

二级参考文献36

  • 1桂春梅,钟求喜,王怀民.基于UML的防火墙和入侵检测联动模型的研究[J].计算机工程与科学,2004,26(11):22-25. 被引量:10
  • 2Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996
  • 3Longley D. , Shain M. , Caelli W.. Information Security: Dictionary of Concepts, Standards and Terms. New York: Macmillan, 1992
  • 4Beizer B.. Software Testing Techniques. 2nd edition. International Thomson Computer Press, 1990
  • 5Farmer D. , Spafford E. H.. The COPS security checker system. Purdue University, West Lafayette: Technical Report,Coast TR 94-01, CSD-TR-993, 1990
  • 6Baldwin R. W.. Kuang: Rule-based security checking. Programming Systems Research Group, Lab for Computer Science, MIT, Massachusetts: Technical Report, 1994
  • 7Zerkle D. , Levitt K. , NetKuang: A multi-host configuration vulnerability checker. In: Proceedings of the 6th USENIX Security Symposium, San Jose, CA, 1996
  • 8Porras P. A. , Kemmerer R. A.. Penetration state transition analysis: A rule-based intrusion detection approach. In: Proceedings of the Eighth Annual Computer Security Applications Conference, 1992, 220~229
  • 9Ilgun K.. USTAT: A real-time intrusion detection system for UNIX. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 16
  • 10Jensen K.. Colored petri nets: Basic concepts, analysis methods and practical use. vol. 1. 2nd edition. Berlin, Germany:Springer-Verlag, 1997

共引文献91

同被引文献5

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部