期刊文献+

网络脆弱性研究 被引量:2

A Study on Network Vulnerability
在线阅读 下载PDF
导出
摘要 首先介绍了实时分析网络脆弱性的一种框架,它能够被用于实时发现攻击点(或网络的脆弱性),描述网络在攻击情况下的状况。为了证明其有效性,对该方法在DDoS上的应用结果进行了分析。 A kind of framework was introduced for realtimely analyzing network vulnerability. It can find the vulnerable points and describe the status of the attacked network. The results on DDoS proved its effectiveness.
出处 《计算机应用》 CSCD 北大核心 2003年第9期47-49,共3页 journal of Computer Applications
关键词 网络脆弱性 脆弱性指数 脆弱性度量 network vulnerability vulnerability index vulnerability metrics
  • 相关文献

参考文献6

  • 1Jha S. Linger R. LongstaffT. et al. Survivability Analysis of Network Specifications[Z]. Workshop on Dependability Despite Malicious Faults. June 2000.
  • 2Schneier B. Attack Trees[J]. Dr. Dobb's Journal. 1999. (10).
  • 3Phillips C. Swiler LP. A graph-based sysetm for network-vulnerability analysis[A]. Proceedings of the new security paradigms workshop[C]. 1998.71 -79.
  • 4Liu Y. Tipper D. Medhi D. et al. Selfconfiguring Survivable Techniques for Quality of Service Enabled Internet[A]. The Third Information Survivability Workshops[C]. 2000.
  • 5CAIDA Metrics Working Group. Network Measurement FAQ[EB/OL].http://www. caida. org/ouueach/metricswg/faq. xml. 2001-01.
  • 6IP Performance Metrics Website[EB/OL]. hap://www. ief. org/html. charters/ippm-charter. html. 2003 - 03.

同被引文献4

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部