期刊文献+

引入系统状态转移概率的可生存性量化评估模型 被引量:1

Survivability Quantitative Evaluation Model of Introducing State Transition Probability
下载PDF
导出
摘要 系统可生存性是网络安全研究的一个新方向,通过对系统可生存性进行评估,可不断完善系统体系结构,从而提高系统可生存能力.针对系统可生存性的量化问题,在深入研究现有的主要可生存性评估方法基础上,提出了系统可生存性的动态量化评估模型SQEM(Survivability Quantitative Evaluation Model),并对系统可生存性进行了形式化定义和数学解析.在SQEM模型中,引入了系统状态转移概率和动态设置指标权重的思想,使评估的准确性得到了提高.通过实例分析,证明了SQEM的可行性和有效性. System survivability is a new study area on network security . The system architecture can be perfected, then survivability level be enhanced through survivability evaluating. This article puts forward a survivability quantitative evaluation model-SQEM, based on lucubrating the main method existed. Then it defines the measurement factors and parses the survivability mathematically, introduces state transition probability and the idea of setting the index power dynamically into the evaluating process of SQEM, which improved the accuracy of evaluation. An example is presented to illustrate the way SQEM works, which demonstrated the validity and feasibility of the method.
出处 《河北大学学报(自然科学版)》 CAS 北大核心 2007年第4期428-433,共6页 Journal of Hebei University(Natural Science Edition)
基金 河北省自然科学基金资助项目(F2004000133)
关键词 可生存性 量化评估 形式化定义 状态转移 system survivability quantitative evaluating formal definition state transition
  • 相关文献

参考文献9

  • 1王红艳,谢小权.网络系统的生存性机制[J].信息网络安全,2003(11):25-28. 被引量:2
  • 2NANCY R MEAD,ROBERT J ELLISON,RICHARD C LINGER.Survivable Network Analysis Method[DB/OL].http://www.cert.org/archive/pdf/00rt013.pdf,2000.
  • 3SOUMYO D MOITRA,SURESH L KONDA.A Simulation Model for Managing Survivability of Networked Information Systems[DB/OL].http://www.cert.org/research/00tr020,2006-10-20.
  • 4田俊峰.一种基于C/S模式的分布式数据库服务器系统模型[J].计算机工程与应用,2003,39(23):176-179. 被引量:12
  • 5VICKIE R WESTMARK.A Definition for Information System Survivability[Z].Proceedings of the 37th Hawaii International Conference on System Sciences,Hawaii,USA,2004.
  • 6ELLISON R J,FISHER DA,LINGER R C,et al.Survivable Ntwork Systems:An Emerging Discipline[DB/OL].http://www.cert.org/research/97tr013,2009-10-09.
  • 7NANCY R MEAD,ROBERT ELLLISON,RICHARD C L,et al.Life-Cycle Models for Survivable Systems[Z].Proceedings of the Third Information Survivability Workshop,Boston MA,USA,2000.
  • 8崔竞松,王丽娜,张焕国,傅建明.一种并行容侵系统研究模型———RC模型[J].计算机学报,2004,27(4):500-506. 被引量:31
  • 9胡华平,金士尧,王维.分布式实时系统的高可靠性研究与实现[J].计算机研究与发展,1998,35(9):841-845. 被引量:23

二级参考文献15

  • 1Steve.J.Ayer著 王广益等译.客户/服务器应用开发指南--使用PAL和C++[M].,..
  • 2金士尧 胡华平 等.具有容错结构的高可用计算机双系统的研究.计算机研究与发展,1998,(8).
  • 3B Kalde,A Medlar.An Information System for Corporate Users:Wide Area Information Servers[R].Connexions-The Interoperability Report, 1991 ;5(11) :2~9.
  • 4Salvatore T March.Allcating Data and Operations to Nodes in Distributed Database Design[J].IEEE Transaction on Knowledge and Data Engineering, 1995 ; 7 ( 2 ).
  • 5W chang,G sheikholeslami,A Zhang.Elficient Resource Selection in Distributed Visual Information Systems[C].In:ACM Multimedia 97- Electronic Proceedings, 1997:8-14.
  • 6Hu Huaping,Proc of ICRMS’96 Guangzhou,1996年,116页
  • 7何容成,计算机世界,1996年
  • 8Amoroso E. G.. Intrusion Detection: An Introduction to Internet Surveillance,Correlation,Trace Back,Traps,and Response. Intrusion. Net Books, 1999
  • 9Northcutt S., Novak J.. Network Intrusion Detection: An Analysts' Handbook. New Riders, 2000
  • 10Du W., Mathur A.P.. Vulnerability testing of software system using fault injection. Department of Computer Science, Purdue University: Technical Report Coast TR-98-02, 1998

共引文献63

同被引文献11

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部