Font Size: a A A

Computer Vulnerability Analysis & Design And Implementation Of Database

Posted on:2005-08-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y DiFull Text:PDF
GTID:2168360122986579Subject:Computer applications
Abstract/Summary:PDF Full Text Request
System vulnerability is the flaw in the design and implementation of computer system's hardware, software or protocol. In the most time, vulnerability is the most reason of leading to security incident. So the research on vulnerabilitise is very important for improving the system's security and reducing occurrence of incidents.Based on the summary of the current research situation in related fields, this paper begins with the concept and attributes of vulnerability, gives a model of software vulnerabilities analysis. Then introduces the study of the vulnerability's classification and grading. A new method of vulnerability classification is given. Lastly this paper presents some methods to find vulnerabilities. The main are source scan and fault injection.In addition, another important work in this paper is the design and implementation of the vulnerability database. Based on the survey of the current situation, we presents our goal of building database. According to this goal, we design and implement a vulnerability database. In this process, data import is an complex work. So we developed related tools for automation.This vulnerability database run in the web of National Computer Network Intrusion Protection Center, Graduate School of Chinese Academy of Sciences. This database has been applied in many our practised such as initiative Security Scanner, Risk Assessment. And this database achieves the high level in related fields of our country and works.
Keywords/Search Tags:Computer Security, Vulnerability, Classification, Vulnerability Database
PDF Full Text Request
Related items