Font Size: a A A

Network Security Assessment System Based On CVE

Posted on:2009-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:H X ZhangFull Text:PDF
GTID:2178360245986389Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of national economy and social information, networks and information systems as the role of basis and the overall is increasing, national economy and social development are more and more dependent on information networks and critical information systems, resulting the issues of information security impact the national security increasingly and prominently. Relying solely on the existing security defense technologies, such as IDS, firewalls, data encryption, and so on, the timeliness of delay is a problem, due to the lack of proactive technology to network attacks. In the framework of "Integrated Network Security Defense System", the security risk assessment is an important safety precaution measure to achieve, through assessment of the network, host, resources, services, we can develop and adjust security strategy, in order to reduce or avoid the part of security risks before attacks.This thesis discussed methods of network security and risk assessment. Then designed assessment architecture according to the state standards: "Information Security Risk Assessment Guide". With the actual needs, assessment will be divided into two stages: static assessment and real-time assessment, in the stage of static assessment it used fuzzy math, qualitative and quantitative, to analyze assets, threats, vulnerabilities and security measures detailed and quantified, in this way the security situation of network system was assessed from parts to overall, subjectivity in the assessment process was reduced. In the stage of real-time assessment hidden markov model was used. This model-based approach enhanced the timeliness and feasibility of real-time assessment.On the basis of international CVE (Common vulnerabilities and exposures), this paper researched on vulnerabilities of security system, designed and implemented vulnerabilities database for enquiries and management. Then put forward a security risk assessment model based on threat assessment and multidisciplinary security tools. The integrity and automatic of assessment were improved. This paper proposed information integration by variety of security tools based on CVE , as well as real-time security assessment method in the assessment system, they will have important significance in use.
Keywords/Search Tags:Network security, Network security assessment, Security vulnerabilities, Common vulnerabilities and exposures
PDF Full Text Request
Related items