1、计算机安全漏洞中英文对照外文翻译文献计算机安全漏洞中英文对照外文翻译文献(文档含英文原文和中文翻译)Talking about security loopholes reference to the core network security business objective is to protect the sustainability of the system and data security, This two of the main threats come from the worm outbreaks, hacking attacks, denial of service
2、 attacks, Trojan horse. Worms, hacker attacks problems and loopholes closely linked to, if there is major security loopholes have emerged, the entire Internet will be faced with a major challenge. While traditional Trojan and little security loopholes, but recently many Trojan are clever use of the
3、IE loophole let you browse the website at unknowingly were on the move. Security loopholes in the definition of a lot, I have here is a popular saying: can be used to stem the thought can not do, and are safety-related deficiencies. This shortcoming can be a matter of design, code realization of the
4、 problem. Different perspective of security loopholes In the classification of a specific procedure is safe from the many loopholes in classification. 1. Classification from the user groups: Public loopholes in the software category. If the loopholes in Windows, IE loophole, and so on. specialized s
5、oftware loophole. If Oracle loopholes, Apache, etc. loopholes. 2. Data from the perspective include : could not reasonably be read and read data, including the memory of the data, documents the data, Users input data, the data in the database, network, data transmission and so on. designated can be
6、written into the designated places (including the local paper, memory, databases, etc.) Input data can be implemented (including native implementation, according to Shell code execution, by SQL code execution, etc.) 3. From the point of view of the scope of the role are : Remote loopholes, an attack
7、er could use the network and directly through the loopholes in the attack. Such loopholes great harm, an attacker can create a loophole through other peoples computers operate. Such loopholes and can easily lead to worm attacks on Windows. Local loopholes, the attacker must have the machine premise
8、access permissions can be launched to attack the loopholes. Typical of the local authority to upgrade loopholes, loopholes in the Unix system are widespread, allow ordinary users to access the highest administrator privileges. 4. Trigger conditions from the point of view can be divided into: Initiat
9、ive trigger loopholes, an attacker can take the initiative to use the loopholes in the attack, If direct access to computers. Passive trigger loopholes must be computer operators can be carried out attacks with the use of the loophole. For example, the attacker made to a mail administrator, with a s
10、pecial jpg image files, if the administrator to open image files will lead to a picture of the software loophole was triggered, thereby system attacks, but if managers do not look at the pictures will not be affected by attacks. 5. On an operational perspective can be divided into: File operation ty
11、pe, mainly for the operation of the target file path can be controlled (e.g., parameters, configuration files, environment variables, the symbolic link HEC), this may lead to the following two questions: Content can be written into control, the contents of the documents can be forged. Upgrading or a
12、uthority to directly alter the important data (such as revising the deposit and lending data), this has many loopholes. If history Oracle TNS LOG document can be designated loopholes, could lead to any person may control the operation of the Oracle computer services; information content can be outpu
13、t Print content has been contained to a screen to record readable log files can be generated by the core users reading papers, Such loopholes in the history of the Unix system crontab subsystem seen many times, ordinary users can read the shadow of protected documents; Memory coverage, mainly for me
14、mory modules can be specified, write content may designate such persons will be able to attack to enforce the code (buffer overflow, format string loopholes, PTrace loopholes, Windows 2000 history of the hardware debugging registers users can write loopholes), or directly alter the memory of secrets
15、 data. logic errors, such wide gaps exist, but very few changes, so it is difficult to discern, can be broken down as follows : loopholes competitive conditions (usually for the design, typical of Ptrace loopholes, The existence of widespread document timing of competition) wrong tactic, usually in
16、design. If the history of the FreeBSD Smart IO loopholes. Algorithm (usually code or design to achieve), If the history of Microsoft Windows 95/98 sharing password can easily access loopholes. Imperfections of the design, such as TCP / IP protocol of the three-step handshake SYN FLOOD led to a denia
17、l of service attack. realize the mistakes (usually no problem for the design, but the presence of coding logic wrong, If history betting system pseudo-random algorithm) External orders, Typical of external commands can be controlled (via the PATH variable, SHELL importation of special characters, et
18、c.) and SQL injection issues. 6. From time series can be divided into: has long found loopholes: manufacturers already issued a patch or repair methods many people know already. Such loopholes are usually a lot of people have had to repair macro perspective harm rather small. recently discovered loo
19、phole: manufacturers just made patch or repair methods, the people still do not know more. Compared to greater danger loopholes, if the worm appeared fool or the use of procedures, so will result in a large number of systems have been attacked. 0day: not open the loophole in the private transactions
20、. Usually such loopholes to the public will not have any impact, but it will allow an attacker to the target by aiming precision attacks, harm is very great. Different perspective on the use of the loopholes If a defect should not be used to stem the original can not do what the (safety-related), on
21、e would not be called security vulnerability, security loopholes and gaps inevitably closely linked to use. Perspective use of the loopholes is: Data Perspective: visit had not visited the data, including reading and writing. This is usually an attackers core purpose, but can cause very serious disa
22、ster (such as banking data can be written). Competence Perspective: Major Powers to bypass or permissions. Permissions are usually in order to obtain the desired data manipulation capabilities. Usability perspective: access to certain services on the system of control authority, this may lead to som
23、e important services to stop attacks and lead to a denial of service attack. Authentication bypass: usually use certification system and the loopholes will not authorize to access. Authentication is usually bypassed for permissions or direct data access services. Code execution perspective: mainly p
24、rocedures for the importation of the contents as to implement the code, obtain remote system access permissions or local system of higher authority. This angle is SQL injection, memory type games pointer loopholes (buffer overflow, format string, Plastic overflow etc.), the main driving. This angle
25、is usually bypassing the authentication system, permissions, and data preparation for the reading. Loopholes explore methods must First remove security vulnerabilities in software BUG in a subset, all software testing tools have security loopholes to explore practical. Now that the hackers used to e
26、xplore the various loopholes that there are means available to the model are: fuzz testing (black box testing), by constructing procedures may lead to problems of structural input data for automatic testing. FOSS audit (White Box), now have a series of tools that can assist in the detection of the s
27、afety procedures BUG. The most simple is your hands the latest version of the C language compiler. IDA anti-compilation of the audit (gray box testing), and above the source audit are very similar. The only difference is that many times you can obtain software, but you can not get to the source code
28、 audit, But IDA is a very powerful anti-Series platform, let you based on the code (the source code is in fact equivalent) conducted a safety audit. dynamic tracking, is the record of proceedings under different conditions and the implementation of all security issues related to the operation (such
29、as file operations), then sequence analysis of these operations if there are problems, it is competitive category loopholes found one of the major ways. Other tracking tainted spread also belongs to this category. patch, the software manufacturers out of the question usually addressed in the patch.
30、By comparing the patch before and after the source document (or the anti-coding) to be aware of the specific details of loopholes. More tools with which both relate to a crucial point: Artificial need to find a comprehensive analysis of the flow path coverage. Analysis methods varied analysis and de
31、sign documents, source code analysis, analysis of the anti-code compilation, dynamic debugging procedures. Grading loopholes loopholes in the inspection harm should close the loopholes and the use of the hazards related Often people are not aware of all the Buffer Overflow Vulnerability loopholes ar
32、e high-risk. A long-distance loophole example and better delineation: Remote access can be an OS, application procedures, version information. open unnecessary or dangerous in the service, remote access to sensitive information systems. Remote can be restricted for the documents, data reading. remotely important or restricted documents, data reading. may be limited for long-range document, data revisions. Remote can be restricted for important documents, data changes. Remote can b
copyright@ 2008-2022 冰豆网网站版权所有
经营许可证编号:鄂ICP备2022015515号-1