{"title":"网络通信漏洞分析方法","authors":"M.P. Ristenbatt","doi":"10.1109/MILCOM.1988.13437","DOIUrl":null,"url":null,"abstract":"A framework for a developing network vulnerability assessment methodology is described. An original network taxonomy is used to orient the analyst to the new network and to assess the potential vulnerability issues. Four network characteristics are used, as in data link vulnerability analysis susceptibility; interceptability; accessibility; and feasibility. Susceptibility issues are pursued in terms of three perspectives: topology; communication protocols; and management and control. The concept of layers, as in the open systems interconnection reference model, is used to deal with the protocol susceptibilities. Security of network control data, to deny spoofing, is included.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Methodology for network communication vulnerability analysis\",\"authors\":\"M.P. Ristenbatt\",\"doi\":\"10.1109/MILCOM.1988.13437\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A framework for a developing network vulnerability assessment methodology is described. An original network taxonomy is used to orient the analyst to the new network and to assess the potential vulnerability issues. Four network characteristics are used, as in data link vulnerability analysis susceptibility; interceptability; accessibility; and feasibility. Susceptibility issues are pursued in terms of three perspectives: topology; communication protocols; and management and control. The concept of layers, as in the open systems interconnection reference model, is used to deal with the protocol susceptibilities. Security of network control data, to deny spoofing, is included.<<ETX>>\",\"PeriodicalId\":66166,\"journal\":{\"name\":\"军事通信技术\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1988-10-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"军事通信技术\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.1988.13437\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"军事通信技术","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.1109/MILCOM.1988.13437","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Methodology for network communication vulnerability analysis
A framework for a developing network vulnerability assessment methodology is described. An original network taxonomy is used to orient the analyst to the new network and to assess the potential vulnerability issues. Four network characteristics are used, as in data link vulnerability analysis susceptibility; interceptability; accessibility; and feasibility. Susceptibility issues are pursued in terms of three perspectives: topology; communication protocols; and management and control. The concept of layers, as in the open systems interconnection reference model, is used to deal with the protocol susceptibilities. Security of network control data, to deny spoofing, is included.<>