期刊文献+

基于安全问题描述的网络安全模型 被引量:4

A Network Security Model Based on Descriptive Method of Security Issue
原文传递
导出
摘要 过去人们对网络安全问题的研究主要集中在技术方面,而网络安全问题不是单纯依靠技术手段能解决的,安全管理也是解决网络安全问题很重要的手段。因此文章首先给出网络安全问题的一种描述方法,综合技术和管理两方面的内容,采取层次化的设计方法,提出了一种混合的安全模型,为今后研究和实施网络安全系统提供参照。 The current standalone-based network security models are not able to withstand the attack by various network threats. Security management is an important means to solve security problems. As a result, this paper first proposes a descriptive method of security problem, and then a new-mixed security model, which integrates security technique and security management and achieves enhanced network protection. This model has used hierarchical design means, and could serves as a reference for future research and implementation of security system.
机构地区 兰州大学信息楼
出处 《通信技术》 2009年第3期177-179,182,共4页 Communications Technology
关键词 安全问题 安全模型 安全管理 security issue security model security management
  • 相关文献

参考文献6

  • 1Yu Jinqiao, Ramana Reddyb Y V, Selliahb S, et al. An architecture for collaborative intrusion detection and nowledge-based alert evaluation[J].Advanced Engineering Informatics, 2005,19(2):93 - 101.
  • 2汪楚娇,林果园.网络安全风险的模糊层次综合评估模型[J].武汉大学学报(理学版),2006,52(5):622-626. 被引量:35
  • 3Siponen M T, Oinas Kukkonen H. A Review of Information Security Issues and Respective Research Contributions[J].The DATA BASE for Advances in Information Systems, 2007,38(1) :61-80.
  • 4林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 5Tanenbaum A S.计算机网络[M].第4版.潘爱明,译.北京:清华大学出版社,2004:31-40.
  • 6Huang Di Jiang, Cao Qing, Sinha A.New Architecture for Intra Domain Network[J]. Communications of The ACM,2006,49 (11):64- 72.

二级参考文献65

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3Qu G.,Jayaprakash,Ramkishore M.,Hariri S.,Raghavendra C.S.A framework for network vulnerability analysis.In:Proceedings of the 1st IASTED International Conference on Communications,Internet,Information Technology (CⅡT2002),St.Thomas,Virgin Islands,USA,2002,289~298
  • 4Moore A.P.,Ellison R.J.,Linger R.C.Attack modeling for information security and survivability.Carnegie Mellon Univer sity:Technical Note CMV/SEI-2001-TH-001,2001
  • 5Jonsson E.,Olovsson T.A quantitative model of the security intrusion process based on attacker behavior.IEEE Transactions on Software Engineering,1997,23(4):235~245
  • 6Mahimkar A.,Shmatikov V.Game-based analysis of Denial-of-service prevention protocols.In:Proceedings of the IEEE Computer Security Foundations Workshop(CSFW05),Aix-en-Provence,France,2005,287~301
  • 7Xia Zheng-You,Zhang Shi-Yong.A kind of network security behavior model based on game theory.In:Proceedings of the 4th International Conference on Parallel and Distributed Computing,Applications and Technologies,PDCAT,Chengdu,China,2003,950~954
  • 8Avizenis A.,Laprie J.,Randell B.Fundamental concepts of dependability.In:Proceedings of the 3rd Information Survivability Workshop,Boston,MA,2000,7~12
  • 9Goseva-Postojanova K.,Wang F.,Wang R.,Gong F.,Vaidyanathan K.,Trivedi K.S.,Muthusamy B.Characterizing intrusion tolerant systems using a state transition model.In:Proceedings of DARPA DISCEX Ⅱ Conference,2001,Ⅱ(2):211~221
  • 10Schneier B.Secrets and Lies:Digital Security in a Networked World.New York:John Wiley & Sons,2000

共引文献129

同被引文献21

  • 1陆虎,薛万宇,徐景.移动代理Aglet体系安全性的改进与实现[J].微计算机信息,2007,23(3):72-73. 被引量:4
  • 2李翔,曹焱,李勤爽.基于行为的网络恶意攻击防御技术研究[J].信息安全与通信保密,2008,30(11):51-53. 被引量:2
  • 3杨磊,周加法,李益发.凭证型代理签名体制的安全性研究[J].微计算机信息,2005,21(12X):52-54. 被引量:9
  • 4汪楚娇,林果园.网络安全风险的模糊层次综合评估模型[J].武汉大学学报(理学版),2006,52(5):622-626. 被引量:35
  • 5Ghada Derbas. TRUMMAR A Trust Model for Mobile Agent Systems Based on Reputation[EB/OL]. [2009-03-14].http://webfea. fea. aub. edu. lb/ proceedings/2OO4/SRC-ECE-44. pdf.
  • 6William Stallings.Cryptography and Network Security Principles and Practices[S].USA:Prentice Hall,2003.
  • 7Kullhack S.Statistical Method in Cryptanalysis[M].New York:Aegean Park Press,1976.
  • 8SCHULZRINNE H, CASNER S, FREDERICK R, et al. RTP: A Transport Protocol for Real-Time Applications: RFC 1889[S]. Fremont, California, USA: The Internet Engineering Task Force(IETF) Publication, 1996.
  • 9CLARK D, TENNEHOUSE D. Architectural Considerations for a New Generation of Protocols[C]//Proceedings of ACM SIGCOMM'90. Philadelpia, Pennsylvania, USA: ACM SIGCOMM Publication, 1990 :. 201-208.
  • 10BUSSE I, DEFFNER B, SCHULZRINNE H. Dynamic QoS Control of Multimedia Applications Based on RRT[M].Missouri, USA:Comupter Communication, Elsevier Publication, Maryland Heights, 1996.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部