Font Size: a A A

Network Vulnerability Analysis

Posted on:2007-06-22Degree:MasterType:Thesis
Country:ChinaCandidate:J Y WuFull Text:PDF
GTID:2178360185468326Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Along with the network popularization, the network security is more and more important. The increase of the network scale, the enhancement of the speed and the complicated connection among network nodes result in the difficulty for security analysis. The root of the network security problem is that network itself is vulnerable. The network vulnerability refers to any characteristic that can be the premise of attack. The network is composed by the host computer, sub-network, kinds of protocols, application software and so on, so the network vulnerability inevitably comes from the security flaw and fault configure of these network components.Network vulnerability analysis is one of the effective solutions for network security problem. Under some circumstances, the single network node may be safe, or single network behavior will not form threat, but for the complicated network connections, the vulnerability situation is quite different. Network vulnerability is not merely the reflection of node flaw, but the measure of vulnerability degree for the entire network. Network vulnerability analysis can evaluate the overall security of the network, which is the foundation for security strategy deployment.The 1st chapter analyzes the background and value of network vulnerability analysis, pointing out the necessary for vulnerability analysis. The 2nd chapter gives three methods for vulnerability classification. The emphasis of the article is the vulnerability analysis methods and these methods are detailed discussed in chapter 3. Besides the traditional analysis method based on the network topology, we propose other methods based on model checking and weight assignment. In chapter 3, we also introduce the attack influence analysis method which provides theoretically proof for the influence degree evaluation...
Keywords/Search Tags:network security, vulnerability classification, network vulnerability analysis, network vulnerability scanning
PDF Full Text Request
Related items