The Design and Implementation of a Vulnerability Information Management System

碩士 === 中原大學 === 資訊工程研究所 === 90 === With the prevalence of computer and computer network, computer security has gained more and more attention. Among all the computer security incidents, the occurrences of instruction to computer systems and networks has become highly frequent and extensive, which re...

Full description

Bibliographic Details
Main Authors: Jean-Chian Chiou, 邱簡謙
Other Authors: Shih-Kun Huang
Format: Others
Language:zh-TW
Published: 2002
Online Access:http://ndltd.ncl.edu.tw/handle/52688673025642430508
id ndltd-TW-090CYCU5392010
record_format oai_dc
spelling ndltd-TW-090CYCU53920102015-10-13T17:35:24Z http://ndltd.ncl.edu.tw/handle/52688673025642430508 The Design and Implementation of a Vulnerability Information Management System 弱點資訊管理系統之設計與實作 Jean-Chian Chiou 邱簡謙 碩士 中原大學 資訊工程研究所 90 With the prevalence of computer and computer network, computer security has gained more and more attention. Among all the computer security incidents, the occurrences of instruction to computer systems and networks has become highly frequent and extensive, which results in serious damage financially and makes intrusion detection an important sector in the overall computer security protection mechanism. Consequently, the vulnerability information management system supporting the operations an instruction detection system becomes more and more important. As the security of a system or a network is only threatened by instruction activities exploiting its vulnerabilities, the detection of such activities can be achieved by monitoring the system operations or the network traffic to see if any vulnerability is being exploiting. Therefore, an effective misuse-based intrusion detection system needs to have its knowledge to vulnerabilities up to date. With many computer security organization discovering, collecting, and organizing vulnerability information, being able to automatically obtain the vulnerability information once it is publicized and apply it to enhance the detection capability of an intrusion detection system will improve the effectiveness of the intrusion detection system and protect the computer environment from loss before a patch to the vulnerability is available. With this understanding, we proposed a vulnerability information management framework managing operations from automatic information collection, integration and automated application to intrusion detection, to the evaluation of a vulnerability’s progression in its life cycle and the analysis of the extent the vulnerability was exploited. A system adapting this management framework has been implemented. Experiment result shows that the defense capability of a computer environment can be effectively enhanced. In addition, the potential threat of a vulnerability is quantized, which makes further analysis on security possible. Keyword: vulnerability database, vulnerability life cycle, vulnerability evaluate. Shih-Kun Huang Hsiao-Rong Tyan 黃世昆 田筱榮 2002 學位論文 ; thesis 45 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 中原大學 === 資訊工程研究所 === 90 === With the prevalence of computer and computer network, computer security has gained more and more attention. Among all the computer security incidents, the occurrences of instruction to computer systems and networks has become highly frequent and extensive, which results in serious damage financially and makes intrusion detection an important sector in the overall computer security protection mechanism. Consequently, the vulnerability information management system supporting the operations an instruction detection system becomes more and more important. As the security of a system or a network is only threatened by instruction activities exploiting its vulnerabilities, the detection of such activities can be achieved by monitoring the system operations or the network traffic to see if any vulnerability is being exploiting. Therefore, an effective misuse-based intrusion detection system needs to have its knowledge to vulnerabilities up to date. With many computer security organization discovering, collecting, and organizing vulnerability information, being able to automatically obtain the vulnerability information once it is publicized and apply it to enhance the detection capability of an intrusion detection system will improve the effectiveness of the intrusion detection system and protect the computer environment from loss before a patch to the vulnerability is available. With this understanding, we proposed a vulnerability information management framework managing operations from automatic information collection, integration and automated application to intrusion detection, to the evaluation of a vulnerability’s progression in its life cycle and the analysis of the extent the vulnerability was exploited. A system adapting this management framework has been implemented. Experiment result shows that the defense capability of a computer environment can be effectively enhanced. In addition, the potential threat of a vulnerability is quantized, which makes further analysis on security possible. Keyword: vulnerability database, vulnerability life cycle, vulnerability evaluate.
author2 Shih-Kun Huang
author_facet Shih-Kun Huang
Jean-Chian Chiou
邱簡謙
author Jean-Chian Chiou
邱簡謙
spellingShingle Jean-Chian Chiou
邱簡謙
The Design and Implementation of a Vulnerability Information Management System
author_sort Jean-Chian Chiou
title The Design and Implementation of a Vulnerability Information Management System
title_short The Design and Implementation of a Vulnerability Information Management System
title_full The Design and Implementation of a Vulnerability Information Management System
title_fullStr The Design and Implementation of a Vulnerability Information Management System
title_full_unstemmed The Design and Implementation of a Vulnerability Information Management System
title_sort design and implementation of a vulnerability information management system
publishDate 2002
url http://ndltd.ncl.edu.tw/handle/52688673025642430508
work_keys_str_mv AT jeanchianchiou thedesignandimplementationofavulnerabilityinformationmanagementsystem
AT qiūjiǎnqiān thedesignandimplementationofavulnerabilityinformationmanagementsystem
AT jeanchianchiou ruòdiǎnzīxùnguǎnlǐxìtǒngzhīshèjìyǔshízuò
AT qiūjiǎnqiān ruòdiǎnzīxùnguǎnlǐxìtǒngzhīshèjìyǔshízuò
AT jeanchianchiou designandimplementationofavulnerabilityinformationmanagementsystem
AT qiūjiǎnqiān designandimplementationofavulnerabilityinformationmanagementsystem
_version_ 1717782855674757120