Font Size: a A A

Research On Computer Security Vulnerability And Its Corresponding Key Technologies

Posted on:2007-06-04Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y Z ZhangFull Text:PDF
GTID:1118360185968091Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, the Internet-related security events are continually growing. Security issues have become more acute. Theory and practice indicate that why the attack activities like virus, malicious code and network intrusion can badly compromise computer systems is due to the existence of security vulnerabilities in design, implementation and maintenance of computer and software systems. Therefore, to deeply analyze and study vulnerabilities is greatly significant for ensuring computer and network systems.Vulnerability description and assessment technologies are two important parts of vulnerability research. The former is used to describe the attributes and characteristics of vulnerabilities. The latter is used to determine the possible loss caused by vulnerabilities in computer and network systems and evaluate the security risk status of systems. Vulnerability description is the basis of the assessment technology, while the assessment technology is finally to reduce or even eliminate the vulnerabilities. However, increasing application requirements demand description and assessment technologies should be continually developed. So in the conceptual category of software security vulnerability, this dissertation conducts the further research on the problems in vulnerability classification, description language, host assessment and network assessment.Because the existing vulnerability taxonomies at large lack support for the quantitative assessment and uncovering the vulnerability correlations, this dissertation proposes a vulnerability taxonomy for mining the correlations with multidimensional quantitative attributes, gives the corresponding mining algorithm and an experiment is given to validate the effectivity of the algorithm. This taxonomy can support the correlation mining of vulnerabilities to generate a vulnerability relationship graph and provide help for smart identification and promoting the evaluating accuracy. And also this taxonomy gives the quantitative attributes in more sides on finer layers and emphasizes the influences of vulnerabilities on the confidentiality, authentication and availability of systems so that it can provide abundant information for vulnerability description and assessment.
Keywords/Search Tags:network security, vulnerability, vulnerability classification, vulnerability assessment, risk propagation
PDF Full Text Request
Related items