Vulnerability is a serious menace to software security, so vulnerability detection has important meanings for improving software security.
漏洞是软件安全的一个严重威胁,如何检测软件中存在的漏洞对提高其安全性具有重要的意义。
The main problem of existing static vulnerability detection methods based source code analysis is their high false positive and false negative rates.
现有的采用基于源代码分析的漏洞静态检测方法中存在的主要问题是误报率和漏报率较高。
By research on the middleware technology and vulnerability detection technology, this paper presents an architecture of security hole detection middleware.
论文通过对漏洞检测技术和中间件技术的研究,结合两者的特点,提出了一个漏洞检测中间件的系统结构。
In this paper, the vulnerability of pattern matching is analyzed, and an effective detection method which is called protocol analysis is proposed.
本文揭示了模式匹配技术的弱点,分析了一种新的、有效的检测方法,即协议分析技术。
The study of attack classification has a significant role to analyze computer system vulnerability and technique used for attack and can help to build effective detection methods.
攻击分类研究对于系统地分析计算机系统脆弱性和攻击利用的技术方法有着重要的意义,这有助于构造高效的入侵检测方法。
Research Interest: Information security, Vulnerability analysis and detection, Malware analysis and prevention.
主要研究方向:信息安全,软件漏洞分析与检测,恶意代码分析与防范。
OS scanning is the prelude of hacker's attack by using OS vulnerability. Real-time detection of OS scanning is one main measure against hacker's intrusion using OS vulnerabilities.
OS扫描是黑客进行OS漏洞攻击的前奏,实时检测OS扫描是防止系统遭受OS漏洞攻击的重要手段。
At present, there are two main methods of host security detection. One is detection by using automated vulnerability scanning tools, the other is manual detection.
目前,主机安全检测方式主要有利用自动化漏洞扫描工具进行检测和人工检测两种。
In the process of studying intrusion detection technology, the vulnerability taxonomy is an important and necessary process.
在进行入侵检测技术的研究中,安全漏洞分类是一个重要和必需的过程。
This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.
利用漏洞扫描器及入侵检测系统的统计结果两方面信息 ,提出了应用模糊信息融合对安全漏洞进行定性评估的方法 。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
应用推荐