期刊文献+

入侵容忍系统的安全态势评估 被引量:2

Security Situation Evaluation of Intrusion Tolerant System
下载PDF
导出
摘要 根据入侵容忍系统与一般网络系统相比所具有的特点,提出了一种专门针对入侵容忍系统的安全态势评估方法.基于入侵对系统所造成的影响以及入侵容忍的功能,构建了数据机密度、数据完整度、服务可用度3个评估指标,并根据各指标的特点给出了其量化方法,然后通过对这3个指标的定量计算来动态评估入侵容忍系统的安全态势.实验表明,所提方法是一种便于操作的态势评估方法,所得到的安全态势能反映出入侵容忍系统的真实安全状况. According to the features of intrusion tolerant system compared to ordinary network system, an evaluating the security situation special for intrusion tolerant system is proposed. Three evaluation indexes are included: firstly, the confidentiality of data, the integrality of data and the usability of service are proposed based on the influence of intrusion and the function of intrusion tolerance. Secondly, the ways of quantifying the indexes are given according to the features of each index, and thirdly, the security situation of intrusion tolerant system is evaluated dynamically through computing the three evaluation indexes. Experiment shows that the method is easy to be operated, and reflects the actual security status of intrusion tolerant system.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2009年第2期57-61,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60374066)
关键词 入侵容忍 安全 态势评估 评估指标 网络安全 intrusion tolerance security situation evaluation evaluation index network security
  • 相关文献

参考文献6

  • 1Blyth A. Footprinting for intrusion detection and threat assessment [ J ]. Information Security Technical Report, 1999, 4(3): 43-53.
  • 2胡威 Li Jianhua Chen Xiuzhen Jiang Xinghao Zuo Min.A scalable model for network situational awareness based on Endsley' s situation model[J].High Technology Letters,2007,13(4):395-401. 被引量:1
  • 3Chen Xiuzhen, Zheng Qinghua, Guan Xiaohong, et al. Multiple behavior information fusion based quantitative threat evaluation[J]. Computers and Seeurity, 2005, 24 (3) : 218-231.
  • 4Madan B B, Goseva P K, Vaidyanathan K, et al. A method for modeling and quantifying the security attributes of intrusion tolerant system [J]. Performance Evaluation, 2004, 56(4): 167-186.
  • 5Stroud R, Welch I, Warne J, et al. A qualitative analysis of the intrusion-tolerance capabilities of the MAFTIA architecture[ C] /// International Conference on Dependable Systems and Networks. [S.l. ] : IEEE, 2004: 453-461.
  • 6Algirdas A Z, Laprie J C, Randell B. Basic concepts and taxonomy of dependable and secure eomputing[J]. IEEE Transactions on Dependable and Secure Computing, 2004, 1 ( 1 ) : 11-33.

同被引文献24

  • 1殷丽华,方滨兴.入侵容忍系统安全属性分析[J].计算机学报,2006,29(8):1505-1512. 被引量:27
  • 2王良民,马建峰,王超.无线传感器网络拓扑的容错度与容侵度[J].电子学报,2006,34(8):1446-1451. 被引量:22
  • 3Porras P A, Fong M W, Valdes A. A mission-impactbased approach to INFOSEC alarm correlation [ C ]// The Fifth International Symposium on Recent Advances in Intrusion Detection. Zurich, Switzerland, 2002 : 95 - 114.
  • 4Si Jiaquan, Wang Kaizhuo, Wang Wei, et al. Study of index weight in network threat evaluation based on improved grey theory [ C ]//IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application. Wuhan,China,2008 : 9 - 13.
  • 5Lippmann Richard, Webster Seth, Stetson Douglas. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection[C]//The Fifth International Symposium on Recent Advances in Intrusion Detection. Zurich, Switzerland, 2002 : 307 - 326.
  • 6Manganaris Stefanos, Christensen Marvin, Zerkle Dan, et al. A data mining analysis of RTID alarms[J].Computer Networks, 2000,34 ( 4 ) : 571 - 577.
  • 7Martin Roesch, Chris Green. Snort users manual 2. 0. 0 [ EB/OL ]. ( 2004-08-02 ) [ 2005-02-01 ]. http ://www. snort, org/docs/snort_manual.
  • 8Taylor Carol, Alves-Foss Jim. An empirical analysis of NATE--network analysis of anomalous traffic events [ C]//The Tenth New Security Paradigms Workshop, Virginia Beach, USA, 2002 : 18 - 26.
  • 9Ortalo Rodolphe, Deswarte Yves, Kaaniche Mohamed. Experimenting with quantitative evaluation tools for monitoring operational security[J]. IEEE Transactions on Software Engineering, 1999,25 ( 5 ) : 633 - 651.
  • 10MOHSEN R,MOHAMMADTAGHI H,VAHAB S M.Fault-tolerant and 3-dimensional distributed topology control algorithms in wireless multi-hop networks[J].Wireless Networks,2006,12:179-188.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部