期刊文献+

一种基于移动代理的网络安全联合风险评估系统模型 被引量:2

A System Model for the United Risk Assessment of Network Security Based on Mobile Agents
下载PDF
导出
摘要 本文建立了一种基于移动代理的网络安全联合风险评估系统模型(MAURA),分析了系统体系结构、各部分功能,并将合同网的协同方法应用到风险评估中,提出了联合风险评估的机制,研究了评估的具体过程,从构造上克服了Agent间分析经验难于共享借鉴的问题。通过自适应的算法调节策略,提高了系统的分析性能,增强了对于外界负载变换的适应能力。仿真实验结果验证了MAURA是一种具有较高分析性能、可自主适应环境变化的网络安全风险评估系统。 A system model for the united risk assessment of network security is proposed based on mobile agents (MAURA). This paper analyses the system structure and the function of each part, applies the cooperation method of the contract net protocol to risk assessment, and puts forth a mechanism of united risk assessment. The process of united risk assessment is also studied, which overcomes the problem which is too difficult to share the analytic experience. Meanwhile, MAURA adopts a new algorithm switch policy to aim at heavy loads of detection tasks to increase the system's adaptive ability. The experimental results show that MAURA is a more adaptive and efficient system,
作者 陆琳琳 马鑫
出处 《计算机工程与科学》 CSCD 北大核心 2010年第5期26-29,共4页 Computer Engineering & Science
关键词 风险评估 移动代理 合同网 联合风险评估 risk assessment mobile agent contract net protocol united risk assessment
  • 相关文献

参考文献10

二级参考文献31

  • 1赵冬梅,张玉清,马建峰.熵权系数法应用于网络安全的模糊风险评估[J].计算机工程,2004,30(18):21-23. 被引量:36
  • 2M.Crosbie,G.Spfford.Defending a computer system using autonomous agents.COAST Laboratory,Purdue University,Tech.Rep.:95-022,1995.
  • 3A.H.Bond,L.Gasser.Readings in Distributed Artificial Intelligence.San Francisco:Morgan Kaufmann,1988.
  • 4J.S.Balasubramaniyan,J.O.Garcia-Fernandez,D.Lsacoff.Architecture for intrusion detection using autonomous agents.COAST Laboratory,Purdue University,Tech.Rep.:9805,1998.
  • 5Mark Slagell.The design and implementation of MAIDS (mobile agent intrusion detection system).Iowa State University,Tech.Rep.:TR01-07,2001.
  • 6Christopher Krügel,Thomas Toth,Engin Kirda:SPARTA,a mobile agent based instrusion detection system.Network Security 2001,Leuven,Belgium,2001.
  • 7D.M.Chess,C.G.Harrison,A.Kershenbaum.Mobile agents:Are they a good idea.IBM T J Waston Research Center,Tech.Rep.:RC19887,1995.
  • 8D.B.Lange,Mitsuru Oshima.Seven good reasons for mobile agents.Communications of the ACM,1999,42(3):88~89.
  • 9李红平 卢正鼎 李瑞轩.多自治域系统中安全互操作风险的灰色关联评估研究[J].计算机科学,2005,32(9):241-245.
  • 10IBM Japan Aglets Home Page, http://www. trl. ibm. com/agets, index, html

共引文献33

同被引文献14

  • 1张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 2Ariri S,Qu G Z,Dharmagadda T.Impact Analysis of Faults and Attacks in Large-Scale Networks[J].IEEE Security&Privacy,2010,1(5):49-54.
  • 3Rtalo R,Deswarte Y,Kaaniche M.Experimenting with Quantita-tive Evaluation Tools for Monitoring Operational Security[J].IEEE Transactions on Software Engineering,2009,25(5):633-650.
  • 4Li T.An Immunity Based Network Security Risk Estimation[J].Science in China Series E-Information Sciences,2009,35(8):798-816.
  • 5Wales E.Vulnerability Assessment Tools[J].Network Secu-rity,2009(7):15-17.
  • 6Yau S,Zhang X.Computer Network Intrusion Detection As-sessment and Prevention Based on Security Dependency Rela-tion[C]∥Proc of the23rd Annual International Computer Software&Applications Conference,2009:86-91.
  • 7Biswas G,Debelak A,Kawamura K.Applications of Qualita-tive Modeling to Knowledge-Based Risk Assessment Studies[C]∥Proc of the2nd International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems,2008:92-101.
  • 8Strutt J,Patrick,Custance N.A Risk Assessment Method-ology for Security Advisors[C]∥Proc of the29th IEEE An-nual International Carnahan Conference on Security Tech-nology,2009:225-229.
  • 9Bruce L.Managed Vulnerability Assessment(MVA)-Improve Security by Understanding Your Own Vulnerabilities[J].Network Security,2010,3(4):8-9.
  • 10吕慧颖,曹元大,时翠霞.基于攻击模拟的网络安全风险分析方法研究[J].北京理工大学学报,2008,28(4):338-342. 被引量:7

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部