欢迎来到天天文库
浏览记录
ID:36498681
大小:684.43 KB
页数:78页
时间:2019-05-11
《基于OVAL漏洞评估系统研究》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、上海交通大学硕士学位论文基于OVAL漏洞评估系统研究姓名:赵杰申请学位级别:硕士专业:电子与通信工程指导教师:蒋兴浩20080901上海交通大学工程硕士学位论文ABSTRACTABSTRACTWiththerapiddevelopmentofcomputernetworktechnology,networksecurityhasbecomedthefocusofthecurrentnetworktechnology.Vulnerabilitiyassessmenttechnologycandetectpotent
2、ialsecurityvulnerabilitiesandassessthesecuritysituationofnetwork.Itisoneofthemostimportantnetworksecuritytechnology.Nowtherearemanyvunerabilityscannersandnetworksecurityassessmenttools,buttheycouldnotsatisfythedemandofnetworksecurity.However,thereisnotonestan
3、dardizedmethodandproductortheservicewhichconformstothestandard.Theproductandtheservicecannotaccuratelydectecttheexistencevulnerability,patchmistakeandconfigurationmistakeofthesystem.Andeachkindofnetworksecurityproductandtheservicecannotbewellcompatibleandoper
4、atemutually.Thiscausesthenetworksecurityassessmenttobestillstern.Inlightofthestatusthispaperhasstudiedthevunerabilityassessmentsystembasedontheinternationalopenvulnerabilityandassessmentlanguage.Thepurposeistostudythestandardizeddescriptionmethodofthevulnerab
5、ilityandtorealizethestandardizationofthevulnerabilitydescriptionandtheprocessofthevulnerabilitydetectionandassessmentandtoassesstheoverallsecuritysituationofthenetwork.ThevunerabilityassessmentsystembasedonOVALwillbegoodtosolvetheproblemofthecompatibility.The
6、vulnerabilityassessmentsystemusesacontrolcenterwithamulti-agentsystemarchitecture.Thepaperhasstudiedthepresentsituationandthedevelopmentofthecurrentvulnerabilitydetectionandassessmenttechnology.Currentpopularvulnerabilitydectectionproductshavebeenanalyzed.The
7、vulnerabilitydetectiontechnologydevelopaheadstandardization.Thepaperhasstudiedthereasonsthatthecausevulnerabilities,theharmofthevulnerability,thevulnerabilitydetectionprincipleaswellasthedevelopment.ofthevulnerabilitydetectiontechnology.ThepaperhasstudiedtheO
8、VALstandard,thedefinitionoftheelementsoftheOVALandthedefinitionofthevulnerabilitywithOVAL.Tothesinglevulnerabilitysecurityrank,thisarticleusestheCVSStoassessitinthesystem.Thisarticledothe
此文档下载收益归作者所有