|
US$699.00 · In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GA/T 1137-2014: Information security technology. Security technical requirements for Anti-DoS attack products
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GA/T 1137-2014 | English | 699 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology. Security technical requirements for Anti-DoS attack products
| |
GA/T 1137-2014
|
PDF similar to GA/T 1137-2014
Basic data | Standard ID | GA/T 1137-2014 (GA/T1137-2014) | | Description (Translated English) | Information security technology. Security technical requirements for Anti-DoS attack products | | Sector / Industry | Public Security (Police) Industry Standard (Recommended) | | Classification of Chinese Standard | A90 | | Classification of International Standard | 35.240 | | Word Count Estimation | 20,239 | | Date of Issue | 2014-03-10 | | Date of Implementation | 2014-03-10 | | Quoted Standard | GB/T 5271.8-2001; GB 17859-1999; GB/T 18336.1; GB/T 18336.2; GB/T 18336.3 | | Regulation (derived from) | Notice on Publication of Public Safety Industry Standard (Year of 2014); Industry Standard Record Announcement No. 4 of 2015 (No. 184) | | Issuing agency(ies) | Ministry of Public Security | | Summary | This standard specifies the security functional requirements, security assurance requirements, and rating requirements for anti-denial-of-service attacks. This standard is applicable to the design, development and testing of products against denial of ser |
GA/T 1137-2014: Information security technology. Security technical requirements for Anti-DoS attack products ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology.Security technical requirements for Anti-DoS attack products
ICS 35.240
A90
People's Republic of China Public Security Industry Standards
Information Security Technology
Anti-DoS product safety technical requirements
Issued on. 2014-03-10
2014-03-10 implementation
People's Republic of China Ministry of Public Security
Table of Contents
Introduction Ⅲ
Introduction Ⅳ
1 Scope 1
2 Normative references 1
3 Terms and definitions
4 anti-denial of service attacks Description 2
5 2 Security Environment
5.1 Hypothesis 2
5.2 Threat 3
5.3 3 Organization for Security Policy
6 security objectives 3
6.1 Product Safety Objective 3
6.2 Objective 4 Environmental Safety
7 Security functional requirements 4
7.1 Denial of Service attacks Recognition 4
Defense Mode 5 7.2
7.3 normal traffic processing 5
7.4 attack signature database maintenance 5
7.5 Audit 5 attacks
7.6 pairs of hot standby 6
7.7 6 processing equipment failure
7.8 identification and authentication 6
7.9 Security Management 6
7.10 Audit Logs 7
8 7 Security assurance requirements
8.1 Configuration Management 7
8.2 Delivery and Operation 8
8.3 Development 8
8.4 guidance document 10
10 8.5 Life Cycle Support
8.6 Test 11
8.7 Vulnerability assessment 11
9 basic principles of technical requirements 12
9.1 Security functional requirements Fundamentals 12
9.2 Security assurance requirements 13 Fundamentals
10 classification requirements 13
10.1 Overview of division 13
10.2 Classification of security functional requirements 13
10.3 Classification of security assurance requirements 14
Foreword
This standard was drafted in accordance with GB/T 1.1-2009 given rules.
This standard was proposed by the Ministry of Public Security Network Security Protection Agency.
This standard is under the jurisdiction of the Ministry of Public Security Information System Standardization Technical Committee.
This standard was drafted. Ministry of Public Security of Computer Information System Security Product Quality Supervision and Inspection Center, the new software Anhui Co.,
Beijing China Information Security Technology Co., Ltd. Green League, Third Institute of Ministry of Public Security.
The main drafters of this standard. Li, Zhang smiled, Zhao Ting, Gu Jian, Yu excellent, Zhang Yan, Xu Hang, Chu Yang Mao, Zhou.
Introduction
This standard describes in detail the anti-denial of service attacks and environment-related product safety assumptions, threats and organizational security policies defined resistance
Service attack products and their supporting environment for security purposes, by the basic principles of security features require proof cover product safety and traceability
Purpose, safety purpose and can be traced back cover environment-related security assumptions, threats and organizational security policies.
The standard base-level reference to GB/T 18336.3-2008 prescribed level EAL2 security assurance requirements, and enhance the level at EAL4 level
Security assurance requirements based on the vulnerability analysis requires upgrade to an attacker can withstand moderate attack potential attack.
This standard only gives the anti-denial of service attacks products should meet the technical requirements of safety, but the denial of service attacks against specific product technology
Art implementations, a method is not required.
Information Security Technology
Anti-DoS product safety technical requirements
1 Scope
This standard specifies the security features against denial of service attacks product requirements, security assurance requirements and grading requirements.
This standard applies to reject anti-design, development and testing services attacks products.
2 Normative references
The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein
Member. For undated references, the latest edition (including any amendments) applies to this document.
GB/T 5271.8-2001 Information technology - Vocabulary - Part 8. Security
GB 17859-1999 computer information system security protection classification criterion
GB/T 18336-2008 (all parts), Information technology - Security techniques - Information Technology Security Evaluation Guidelines
3 Terms and Definitions
GB/T 5271.8-2001, GB 17859-1999 and GB/T 18336-2008 (all parts), and the definition of the following terms and
Definitions apply to this document.
3.1
Denial of service attacks denialofserviceattack
A network attack, by constructing a specific network service request, aimed at using excessive bandwidth or server resources, so that it
He could not get the normal service request response.
3.2
Anti-DoS product Anti-DoSattackproduct
Denial of service attacks to identify and intercept, thereby reducing its hazardous products.
3.3
ping of death attack pingofdeathattack
By sending maliciously crafted ICMP packets lead to a large target server crash.
3.4
Teardrop attack teardropattack
By sending maliciously crafted overlapping offset data packets lead to a target server crash.
3.5
UDP flood attack UDPfloodattack
By sending a large number of UDP packets bandwidth or server resources of an attack.
3.6
syn flood attack synfloodattack
TCP handshake by sending a large number of the first packet message, causing the target server runs out of resources and can not respond to normal please
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GA/T 1137-2014_English be delivered?Answer: Upon your order, we will start to translate GA/T 1137-2014_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GA/T 1137-2014_English with my colleagues?Answer: Yes. The purchased PDF of GA/T 1137-2014_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|