期刊文献+

一种基于网络熵的计算机网络攻击效果定量评估方法 被引量:55

A quantitative evaluation technique of attack effect of computer network based on network entropy
下载PDF
导出
摘要 提出了一种基于网络信息熵的计算机网络攻击效果定量评估模型。从计算机网络受攻击前后安全特性变化的角度,提出了网络熵的概念。由选取和简化合适的网络安全性能指标体系入手,借助于层次分析法(AHP),着重分析了网络熵差的计算方法,并给出了基于网络熵的攻击效果评估系统的实现思路和相应的模型校验方法。经过初步测试和计算,结果表明该模型能够比较合理地反映实际的网络攻击效果。 An attack effect evaluation model of computer network based on network entropy was proposed in this paper. The paper put forward the concept of network entropy from the point of view of the security characteristic change of computer network after it was attacked. The calculation technique of network entropy difference was analyzed in detail by analytical hierarchy process (AHP) with the beginning of the choice and simplification of proper network security index set. The implementation idea of the attack effect evaluation system based on network entropy and the corresponding model verification method were presented as well. The elementary test and calculation results show that the model can be in all reason utilized to measure the actual network attack effect.
出处 《通信学报》 EI CSCD 北大核心 2004年第11期158-165,共8页 Journal on Communications
基金 国家自然科学基金资助项目(60372039)"十五"国防预研基金资助项目(41329080101)
关键词 网络熵 攻击效果 评估模型 DELPHI法 层次分析法 网络安全指标 network entropy attack effect evaluation model Delphi method AHP network security index
  • 相关文献

参考文献11

  • 1Canada. Communications Security Establishment, Canadian Trusted Computer Product Evaluation Criteria (V3.0e) [S]. 1993.
  • 2System security engineering capability maturity model (SSE-CMM) [EB/OL]. http://www.se-cat.com/download/download.shtml.
  • 3Trusted Computer System Evaluation Criteria[S]. US National Computer Security Center, NCSC 5200.28-STD, 1985.
  • 4Information Technology Security Evaluation Criteria[S]. Provisional Harmonized Criteria of France, Germany, Netherlands, and United Kingdom, Commission of the European Communities, 1991.
  • 5The International Organization for Standardization. Information Technology-Code of Practice for Information Security Management,ISO/IEC 17799: 2000(E)[S]. 2000.
  • 6The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation-Part 1:Introduction and General Model, ISO/IEC 15408-1:1999(E)[S]. 1999.
  • 7The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation-Part 2:Security Function Requirements, ISO/IEC 15408-2:1999(E)[S]. 1999.
  • 8The International Organization for Standardization, Common Criteria for Information Technology Security Evaluation-Part 3:Security Assurance Requirements, ISO/IEC 15408-3: 1999(E)[S]. 1999.
  • 9BRESLAU L, ESTRIN D, FALL K. Advances in network simulation[J]. IEEE Computer, 2000, 35(5): 59-67.
  • 10张义荣,鲜明,赵志超,肖顺平,王国玉.计算机网络攻击效果评估技术研究[J].国防科技大学学报,2002,24(5):24-28. 被引量:49

二级参考文献8

  • 1Canada Communications Security Establishment. Canadian Trusted Computer Product Evaluation Criteria (V3.0e) [S]. 1993.
  • 2System Security Engineering Capability Maturity Model (SSE-CMM) [EB]. http://www.se-cat.com/ download/ download.html, 2000-09-06.
  • 3SSE-CMM Author Group. SSE-CMM (V2.0b) [M]. 1999.
  • 4The International Organization for Standardization. Information Technology-Code of Practice for Information Security Management[S],ISO/IEC 17799:2000(E), 2000.
  • 5The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation-Part 1: Introduction and General Model[S],ISO/IEC 15408-1:1999(E), 1999.
  • 6The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation-Part 2: Security Function Requirements[S],ISO/IEC 15408-2:1999(E), 1999.
  • 7The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation-Part 3: Security Assurance Requirements[S],ISO/IEC 15408-3:1999(E), 1999.
  • 8江常青,吴世忠.一种信息系统安全测度的框架[J].信息安全与通信保密,2002,24(1):26-28. 被引量:9

共引文献48

同被引文献395

引证文献55

二级引证文献232

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部