Right-Variation Rule Based Network Vulnerability Analysis
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Network vulnerability can lead to right-variation. From the view of how an attacker uses the vulnerabilities to achieve the unauthorized right of the destination entity, this paper models the vulnerabilities which lead to right-variation and introduces the concept of take rule and vulnerability right-variation rule. Based on the constructed right-variation model and the rules, the right-variation road closure can be achieved by using the vulnerability right-variation algorithm. A vulnerable network is modeled as the study case and it shows the effectiveness of the approach.

    Reference
    Related
    Cited by
Get Citation

莫秋妹,陈启买.基于权限变更规则的网络脆弱性分析方法.计算机系统应用,2012,21(6):96-100

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:September 15,2011
  • Revised:November 06,2011
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063