{"title":"面向大规模分布式系统的多维漏洞分析框架","authors":"Xiaohui Kuang, Yan Wen, Fei Xu, Xiang Li","doi":"10.1109/ICSAI.2012.6223141","DOIUrl":null,"url":null,"abstract":"With the large-scale distributed system plays an increasingly important role in such fields as national security, critical infrastructure and social life, its vulnerability analysis problem has become a growing focus nowadays. As a vulnerability analysis object, a multi-layer model is put forward firstly, and then a multi-dimension vulnerability analysis framework of large-scale distributed system is proposed, which provides an overview of vulnerability analysis research area and method in three aspects, namely vulnerability analysis phase, lifecycle process and taxonomy of vulnerability. From the view of lifecycle process, the challenge and research method is analysis by vulnerability analysis phase.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A multi-dimension vulnerability analysis framework for large-scale distributed system\",\"authors\":\"Xiaohui Kuang, Yan Wen, Fei Xu, Xiang Li\",\"doi\":\"10.1109/ICSAI.2012.6223141\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the large-scale distributed system plays an increasingly important role in such fields as national security, critical infrastructure and social life, its vulnerability analysis problem has become a growing focus nowadays. As a vulnerability analysis object, a multi-layer model is put forward firstly, and then a multi-dimension vulnerability analysis framework of large-scale distributed system is proposed, which provides an overview of vulnerability analysis research area and method in three aspects, namely vulnerability analysis phase, lifecycle process and taxonomy of vulnerability. From the view of lifecycle process, the challenge and research method is analysis by vulnerability analysis phase.\",\"PeriodicalId\":164945,\"journal\":{\"name\":\"2012 International Conference on Systems and Informatics (ICSAI2012)\",\"volume\":\"65 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-05-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Systems and Informatics (ICSAI2012)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSAI.2012.6223141\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Systems and Informatics (ICSAI2012)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSAI.2012.6223141","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A multi-dimension vulnerability analysis framework for large-scale distributed system
With the large-scale distributed system plays an increasingly important role in such fields as national security, critical infrastructure and social life, its vulnerability analysis problem has become a growing focus nowadays. As a vulnerability analysis object, a multi-layer model is put forward firstly, and then a multi-dimension vulnerability analysis framework of large-scale distributed system is proposed, which provides an overview of vulnerability analysis research area and method in three aspects, namely vulnerability analysis phase, lifecycle process and taxonomy of vulnerability. From the view of lifecycle process, the challenge and research method is analysis by vulnerability analysis phase.