[1] |
龙门, 夏靖波, 张子阳 等. 节点相关的隐马尔可夫模型的网络安全评估[J]. 北京邮电大学学报, 2010,33 (6): 121-124. LONG M , XIA J B , ZHANG Z Y , et al. Network security assessment based on node correlated HMM[J]. Journal of Beijing Un versity of Posts and Telecommunications, 2010,33 (6): 121-124.
|
[2] |
张保稳, 罗铮, 薛质 等. 基于全局权限图的网络风险评估模型[J]. 上海交通大学学报, 2010,44 (9): 1197-1200. ZHANG B W , LUO Z , XUE Z , et al. A network risk assessment model based on network global priviliege graph[J]. Journal o Shanghai Jiao-tong University, 2010,44 (9): 1197-1200.
|
[3] |
STIJN V C . Threat Modeling for Web Application Using the STRIDE Model[D]. London: Royal Holloway University of London, 2004.
|
[4] |
付钰, 吴晓平, 叶清 . 基于改进FAHP-BN的信息系统安全态势评估方法[J]. 通信学报, 2009,30 (9): 135-140. FU Y , WU X P , YE Q . Approach for information systems security situ-ation evaluation using improved FAHP and Bayesian network[J]. Journal on Communications, 2009,30 (9): 135-140.
|
[5] |
NGUYEN H V , CHOI Y . Proactive detection of DdoS attacks utilizing k-NN classifier in an anti-DDos framework[J]. International Journal of Electrical, 2010,4 (4): 247-252.
|
[6] |
谢柏林, 余顺争 . 基于应用层协议分析的应用层实时主动防御系统[J]. 计算机学报, 2011,34 (3): 452-463. XIE B L , YU S Z . Application layer real-time proactive defense sys-tem based on application layer protocol analysis[J]. Cinese Journal of Computers, 2011,34 (3): 452-463.
|
[7] |
LI Z F . Using support vector machines to enhance the performance of Bayesian face recognition[J]. IEEE Transactions on Information Fo-rensics and Security, 2007,2 (2): 174-180.
|
[8] |
MCNAB C . Network Security Assessment[M]. New York: O'Reilley Media, Inc, 2007.
|
[9] |
张永铮, 方滨兴, 迟悦 . 计算机弱点数据库综述与评价[J]. 计算机科学, 2006,33 (8): 19-21. ZHANG Y Z , FANG B X , CHI Y . Survey and evaluation on computer vulnerability database[J]. Computer Science, 2006,33 (8): 19-21.
|
[10] |
周亮, 李俊娥, 陆天波 等. 信息系统漏洞风险定量评估模型研究[J]. 通信学报, 2009,30 (2): 71-76. ZHOU L , LI J E , LU T B , et al. Research on quantitative assessment model on vulnerability risk for information system[J]. Journal on Communications, 2009,30 (2): 71-76.
|
[11] |
KAMMERER R , FROMEL B , WASICEK A . Enhancing security in CAN systems using a star coupling router[A]. Proceedin of the 7th IEEE International Symposium on Industrial Embedded Systems[C]. Karlsruhe, Germany, 2012.237-246.
|
[12] |
AL-IBRAHIM M , SAVSAR M , ADI W . A security analysis for label switching routers[A]. ACS/IEEE International Conference on Com-puter Systems and Applications[C]. Beirut, Lebanon, 2001.525-529.
|
[13] |
WANG Z Q , ZHANG Y Q , LIU Q X . A research on vulnerability discovering for router protocols based on fuzzing[A]. 7th Inter-national ICST Conference on Communications and Networkng[C]. Kunming, China, 2012.245-250.
|
[14] |
WU Y H , WU J P , XU K , et al. The design and implementation of router security subsystem based on IPSec[A]. 2002 IEEE Region 10 Conference on Compute4rs, Communications, Control and En-gineering[C]. Beijing, China, 2002.160-165.
|
[15] |
VARET A , LARRIEU N . Design and development of an embedded aeronautical router with security capabilities[A]. 2012 Integrated Communications Navigation and Surveillance[C]. Washington, USA, 2012.1-14.
|
[16] |
ROCA A , FLICH J , SILLA F , et al. A latency-efficient router archi-tecture for CMP systems[A]. 13th Euromicro Conference Digital System Design Architectures, Methods and Tools[C]. Lil e, France, 2010.165-172.
|
[17] |
桂宾 . 路由器安全风险分析及规避策略[J]. 计算机安全, 2002,6: 16-18. GUI B . Research on router security risk analysis[J]. Computer Security, 2002,6: 16-18.
|
[18] |
SCHUDEL G , SMITH D J . Router Security Strategies: Security IP Network Traffic Planes[M]. Cisco Press, 2008.
|
[19] |
QU G Z , PAKASH J , KISHORE R , et al. A framework for network vulnerability analysis[EB/OL]. , 2003.
|
[20] |
NTULI N , SUNYOUNG H . Detecting router cache snooping i named data networking[A]. 2012 International Conference on ICT Conver-gence[C]. Jeju Island, Korea, 2012.714-718.
|
[21] |
HU N N , LI L , MAO Z M , et al A measurement study of Internet bottlenecks[A]. INFOCOM 2005 24th Annual Joint Confere of the IEEE Computer and Communications Societies[C]. Miami, USA, 2005.1689-1700.
|
[22] |
ROESCH M , GREEN C . Snort uses manual, snort release 2.0.0.2003[EB/OL]. .
|
[23] |
GB/T 20984-2007. 信息安全技术信息安全风险评估规范[S]. 北京: 中国标准出版社, 2007.GB/T 20984-2007 Information Technology Security Evaluation Crite-ria[S]. Beijing: China Zhijian Publishing House, 2007.
|