通信学报 ›› 2012, Vol. 33 ›› Issue (Z1): 79-87.doi: 10.3969/j.issn.1000-436x.2012.z1.011

• 学术论文 • 上一篇    下一篇

安全漏洞等级划分关键技术研究

刘奇旭1,张翀斌2,张玉清1,张宝峰2   

  1. 1 中国科学院 研究生院 国家计算机网络入侵防范中心,北京 100049
    2 中国信息安全测评中心,北京 100085
  • 出版日期:2012-09-25 发布日期:2017-08-03
  • 基金资助:
    中国博士后科学基金资助项目;中国科学院研究生院院长基金资助项目;国家自然科学基金资助项目

Research on key technology of vulnerability threat classification

Qi-xu LIU1,Chong-bin ZHANG2,Yu-qing ZHANG1,Bao-feng ZHANG2   

  1. 1 National Computer Network Intrusion Protection Center,GUCAS,Beijing 100049,China
    2 China Information Technology Security Evaluation Center,Beijing 100085,China
  • Online:2012-09-25 Published:2017-08-03
  • Supported by:
    China Postdoctoral Science Foundation;The President Fund of GUCAS;The National Natural Science Foundation of China

摘要:

针对安全漏洞管理过程中涉及到的威胁等级划分问题,选取了访问途径、利用复杂度和影响程度3组安全漏洞评估要素,采用层次分析法建立安全漏洞等级划分模型,将安全漏洞等级评定为超危、高危、中危和低危4个级别。最终为安全漏洞国家标准制定、安全漏洞管理、安全漏洞处理、风险评估、风险减缓等方面的工作提供参考。

关键词: 信息安全, 安全漏洞, 安全漏洞评估, 安全漏洞管理

Abstract:

In order to solve the vulnerability assessment problem of vulnerability management,three attribute groups were selected to qualitatively evaluate vulnerability threat.After the selection of vulnerability attributes,analytic hierarchy process method was used to establish vulnerability classification model,which can divide vulnerabilities into four risk levels:critical,high,moderate and low.The method provides a reference for national standard,vulnerability management,vulnerability handling,risk assessment,risk mitigation,etc.

Key words: information security, vulnerability, vulnerability evaluation, vulnerability management

No Suggested Reading articles found!