计算机安全漏洞中英文对照外文翻译文献.docx

上传人:b****7 文档编号:10245428 上传时间:2023-02-09 格式:DOCX 页数:13 大小:23.37KB
下载 相关 举报
计算机安全漏洞中英文对照外文翻译文献.docx_第1页
第1页 / 共13页
计算机安全漏洞中英文对照外文翻译文献.docx_第2页
第2页 / 共13页
计算机安全漏洞中英文对照外文翻译文献.docx_第3页
第3页 / 共13页
计算机安全漏洞中英文对照外文翻译文献.docx_第4页
第4页 / 共13页
计算机安全漏洞中英文对照外文翻译文献.docx_第5页
第5页 / 共13页
点击查看更多>>
下载资源
资源描述

计算机安全漏洞中英文对照外文翻译文献.docx

《计算机安全漏洞中英文对照外文翻译文献.docx》由会员分享,可在线阅读,更多相关《计算机安全漏洞中英文对照外文翻译文献.docx(13页珍藏版)》请在冰豆网上搜索。

计算机安全漏洞中英文对照外文翻译文献.docx

计算机安全漏洞中英文对照外文翻译文献

计算机安全漏洞中英文对照外文翻译文献

(文档含英文原文和中文翻译)

 

Talkingaboutsecurityloopholes

referencetothecorenetworksecuritybusinessobjectiveistoprotectthesustainabilityofthesystemanddatasecurity,Thistwoofthemainthreatscomefromthewormoutbreaks,hackingattacks,denialofserviceattacks,Trojanhorse.Worms,hackerattacksproblemsandloopholescloselylinkedto,ifthereismajorsecurityloopholeshaveemerged,theentireInternetwillbefacedwithamajorchallenge.WhiletraditionalTrojanandlittlesecurityloopholes,butrecentlymanyTrojanarecleveruseoftheIEloopholeletyoubrowsethewebsiteatunknowinglywereonthemove.

Securityloopholesinthedefinitionofalot,Ihavehereisapopularsaying:

canbeusedtostemthe"thought"cannotdo,andaresafety-relateddeficiencies.Thisshortcomingcanbeamatterofdesign,coderealizationoftheproblem.

Differentperspectiveofsecurityloopholes

Intheclassificationofaspecificprocedureissafefromthemanyloopholesinclassification.

1.Classificationfromtheusergroups:

●Publicloopholesinthesoftwarecategory.IftheloopholesinWindows,IEloophole,andsoon.

●specializedsoftwareloophole.IfOracleloopholes,Apache,etc.loopholes.

2.Datafromtheperspectiveinclude:

●couldnotreasonablybereadandreaddata,includingthememoryofthedata,documentsthedata,Usersinputdata,thedatainthedatabase,network,datatransmissionandsoon.

●designatedcanbewrittenintothedesignatedplaces(includingthelocalpaper,memory,databases,etc.)

●Inputdatacanbeimplemented(includingnativeimplementation,accordingtoShellcodeexecution,bySQLcodeexecution,etc.)

3.Fromthepointofviewofthescopeoftheroleare:

●Remoteloopholes,anattackercouldusethenetworkanddirectlythroughtheloopholesintheattack.Suchloopholesgreatharm,anattackercancreatealoopholethroughotherpeople'scomputersoperate.SuchloopholesandcaneasilyleadtowormattacksonWindows.

●Localloopholes,theattackermusthavethemachinepremiseaccesspermissionscanbelaunchedtoattacktheloopholes.Typicalofthelocalauthoritytoupgradeloopholes,loopholesintheUnixsystemarewidespread,allowordinaryuserstoaccessthehighestadministratorprivileges.

4.Triggerconditionsfromthepointofviewcanbedividedinto:

●Initiativetriggerloopholes,anattackercantaketheinitiativetousetheloopholesintheattack,Ifdirectaccesstocomputers.

●Passivetriggerloopholesmustbecomputeroperatorscanbecarriedoutattackswiththeuseoftheloophole.Forexample,theattackermadetoamailadministrator,withaspecialjpgimagefiles,iftheadministratortoopenimagefileswillleadtoapictureofthesoftwareloopholewastriggered,therebysystemattacks,butifmanagersdonotlookatthepictureswillnotbeaffectedbyattacks.

5.Onanoperationalperspectivecanbedividedinto:

●Fileoperationtype,mainlyfortheoperationofthetargetfilepathcanbecontrolled(e.g.,parameters,configurationfiles,environmentvariables,thesymboliclinkHEC),thismayleadtothefollowingtwoquestions:

◇Contentcanbewrittenintocontrol,thecontentsofthedocumentscanbeforged.Upgradingorauthoritytodirectlyaltertheimportantdata(suchasrevisingthedepositandlendingdata),thishasmanyloopholes.IfhistoryOracleTNSLOGdocumentcanbedesignatedloopholes,couldleadtoanypersonmaycontroltheoperationoftheOraclecomputerservices;

◇informationcontentcanbeoutputPrintcontenthasbeencontainedtoascreentorecordreadablelogfilescanbegeneratedbythecoreusersreadingpapers,SuchloopholesinthehistoryoftheUnixsystemcrontabsubsystemseenmanytimes,ordinaryuserscanreadtheshadowofprotecteddocuments;

●Memorycoverage,mainlyformemorymodulescanbespecified,writecontentmaydesignatesuchpersonswillbeabletoattacktoenforcethecode(bufferoverflow,formatstringloopholes,PTraceloopholes,Windows2000historyofthehardwaredebuggingregistersuserscanwriteloopholes),ordirectlyalterthememoryofsecretsdata.

●logicerrors,suchwidegapsexist,butveryfewchanges,soitisdifficulttodiscern,canbebrokendownasfollows:

◇loopholescompetitiveconditions(usuallyforthedesign,typicalofPtraceloopholes,Theexistenceofwidespreaddocumenttimingofcompetition)◇wrongtactic,usuallyindesign.IfthehistoryoftheFreeBSDSmartIOloopholes.◇Algorithm(usuallycodeordesigntoachieve),IfthehistoryofMicrosoftWindows95/98sharingpasswordcaneasilyaccessloopholes.◇Imperfectionsofthedesign,suchasTCP/IPprotocolofthethree-stephandshakeSYNFLOODledtoadenialofserviceattack.◇realizethemistakes(usuallynoproblemforthedesign,butthepresenceofcodinglogicwrong,Ifhistorybettingsystempseudo-randomalgorithm)

●Externalorders,Typicalofexternalcommandscanbecontrolled(viathePATHvariable,SHELLimportationofspecialcharacters,etc.)andSQLinjectionissues.

6.Fromtimeseriescanbedividedinto:

●haslongfoundloopholes:

manufacturersalreadyissuedapatchorrepairmethodsmanypeopleknowalready.Suchloopholesareusuallyalotofpeoplehavehadtorepairmacroperspectiveharmrathersmall.

●recentlydiscoveredloophole:

manufacturersjustmadepatchorrepairmethods,thepeoplestilldonotknowmore.Comparedtogreaterdangerloopholes,ifthewormappearedfoolortheuseofprocedures,sowillresultinalargenumberofsystemshavebeenattacked.

●0day:

notopentheloopholeintheprivatetransactions.Usuallysuchloopholestothepublicwillnothaveanyimpact,butitwillallowanattackertothetargetbyaimingprecisionattacks,harmisverygreat.

Differentperspectiveontheuseoftheloopholes

Ifadefectshouldnotbeusedtostemthe"original"cannotdowhatthe(safety-related),onewouldnotbecalledsecurityvulnerability,securityloopholesandgapsinevitablycloselylinkedtouse.

Perspectiveuseoftheloopholesis:

●DataPerspective:

visithadnotvisitedthedata,includingreadingandwriting.Thisisusuallyanattacker'scorepurpose,butcancauseveryseriousdisaster(suchasbankingdatacanbewritten).

●CompetencePerspective:

MajorPowerstobypassorpermissions.Permissionsareusuallyinordertoobtainthedesireddatamanipulationcapabilities.

●Usabilityperspective:

accesstocertainservicesonthesystemofcontrolauthority,thismayleadtosomeimportantservicestostopattacksandleadtoadenialofserviceattack.

●Authenticationbypass:

usuallyusecertificationsystemandtheloopholeswillnotauthorizetoaccess.Authenticationisusuallybypassedforpermissionsordirectdataaccessservices.

●Codeexecutionperspective:

mainlyproceduresfortheimportationofthecontentsastoimplementthecode,obtainremotesystemaccesspermissionsorlocalsystemofhigherauthority.ThisangleisSQLinjection,memorytypegamespointerloopholes(bufferoverflow,formatstring,Plasticoverflowetc.),themaindriving.Thisangleisusuallybypassingtheauthenticationsystem,permissions,anddatapreparationforthereading.

Loopholesexploremethodsmust

FirstremovesecurityvulnerabilitiesinsoftwareBUGinasubset,allsoftwaretestingtoolshavesecurityloopholestoexplorepractical.Nowthatthe"hackers"usedtoexplorethevariousloopholesthattherearemeansavailabletothemodelare:

●fuzztesting(blackboxtesting),byconstructingproceduresmayleadtoproblemsofstructuralinputdataforautomatictesting.

●FOSSaudit(WhiteBox),nowhaveaseriesoftoolsthatcanassistinthedetectionofthesafetyproceduresBUG.ThemostsimpleisyourhandsthelatestversionoftheClanguagecompiler.

●IDAanti-compilationoftheaudit(grayboxtesting),andabovethesourceauditareverysimilar.Theonlydifferenceisthatmanytimesyoucanobtainsoftware,butyoucannotgettothesourcecodeaudit,ButIDAisaverypowerfulanti-Seriesplatform,letyoubasedonthecode(thesourcecodeisinfactequivalent)conductedasafetyaudit.

●dynamictracking,istherecordofproceedingsunderdifferentconditionsandtheimplementationofallsecurityissuesrelatedtotheoperation(suchasfileoperations),thensequenceanalysisoftheseoperationsifthereareproblems,itiscompetitivecategoryloopholesfoundoneofthemajorways.Othertrackingtaintedspreadalsobelongstothiscategory.

●patch,thesoftwaremanufacturersoutofthequestionusuallyaddressedinthepatch.Bycomparingthepatchbeforeandafterthesourcedocument(ortheanti-coding)tobeawareofthespecificdetailsofloopholes.

Moretoolswithwhichbothrelatetoacrucialpoint:

Artificialneedtofindacomprehensiveanalysisoftheflowpathcoverage.Analysismethodsvariedanalysisanddesigndocuments,sourcecodeanalysis,analysisoftheanti-codecompilation,dynamicdebuggingprocedures.

Gradingloopholes

loopholesintheinspectionharmshouldclosetheloopholesandtheuseofthehazardsrelatedOftenpeoplearenotawareofalltheBufferOverflowVulnerabilityloopholesarehigh-risk.Along-distanceloopholeexampleandbetterdelineation:

●RemoteaccesscanbeanOS,applicationprocedures,versioninformation.

●openunnecessaryordangerousintheservice,remoteaccesstosensitiveinformationsystems.

●Remotecanberestrictedforthedocuments,datareading.

●remotelyimportantorrestricteddocuments,datareading.

●maybelimitedforlong-rangedocument,datarevisions.

●Remotecanberestrictedforimportantdocuments,datachanges.

●Remotecanb

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 高等教育 > 军事

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1