期刊文献+

基于决策树的安全审计策略自适应管理控制平台 被引量:3

Self-adapting Security Auditing Management Controller Platform Based on Decision Tree
原文传递
导出
摘要 目前国内众多信息安全企业针对电信运营商市场定制了4A(统一的账号、认证、授权、审计管理)解决方案。其中审计管理是展现4A整体效果,实施综合审计的最有力的功能模块之一,而审计策略的制定则是审计管理最核心的部分。现有审计策略定制方案主要为定制式,不具有通用性、可移植性等特点,且审计策略在制定的过程中,过多的人为因素带来的安全隐患往往是用户所不能接受的。本文所述基于决策树的安全审计策略自适应管理控制平台正是针对4A管理平台之审计管理子系统的业务需求和性能优化等方面存在的问题,结合用于处理海量数据的数据挖掘技术,实现了由系统自动生成审计策略,定期自适应优化审计策略等功能的审计策略通用平台。决策树优化的特殊方法使审计策略在应用过程中可以不断优化,从而满足不同业务系统的审计需求。 Currently,quite a few domestic information security enterprises have customized the 4A solution(integrated Accounting,Authentication,Authorization,Auditing management) for the Telecom Operators in China.Auditing management for integrated auditing is one of the most powerful function model which reflects a global effect of the 4A solution.Moreover,the auditing strategy customization is the core of the auditing management.The existing auditing strategy customization scheme is mainly the customization mode,which lacks generality,transportability and other important features.During the process of working out an auditing strategy,many human factors would be involved in security threats,which are not acceptable by the enterprises or corporation.The Self-adapting Security Auditing Management controller platform based on decision tree is a general auditing strategy platform which implements automatically the generation of the audit policy by the system and a self-adapting optimizing auditing strategy periodically.The implementation includes a data mining technology to deal with huge amount of data.The business requirements and performance optimization are dealt with in the integrated auditing subsystem of the integrated security controller platform.The decision tree optimization method enables the auditing strategy being optimized continuously during its operation,to satisfy the auditing requirements of different business systems.
作者 张良 何华
出处 《科技导报》 CAS CSCD 北大核心 2010年第24期67-70,共4页 Science & Technology Review
关键词 安全审计 数据挖掘 决策树 自适应 security audit data mining decision tree self-adapting
  • 相关文献

参考文献8

二级参考文献24

  • 1程玉松,孟丽荣,盛琦,刘学波,柳楠.利用规则RBAC模型实现门户的安全访问控制[J].计算机工程与设计,2005,26(5):1299-1301. 被引量:11
  • 2Helman P, Liepins G. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Trans. on Software Engineering, 1993,19(9):886-901.
  • 3Biskup J, Flegel U. Transaction-Based pseudonyms in audit data for privacy respecting intrusion detection. LNCS 1907, Berlin:Springer-Verlag, 2000.28-48.
  • 4Sandhu R, Chen F. The multilevel relational (MLR) data model. ACM Trans. on Information and System Security, 1998,1(1):93-132.
  • 5Lunt TF, Denning DE, Schell RR, Heckman M, Shockley WR. The SeaView security model. IEEE Trans. on Software Engineering,1990,16(6):593 -607.
  • 6National Computer Security Center. A guide to understanding security modeling in trusted systems. Technical Report,NCSC-TG-010, National Computer Security Center, 1992.
  • 7Jajodia S, Samarati P, Subrahmanian VS. A logical language for expressing authorizations. In: Proc. of the 1997 IEEE Symp. on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1997.31-42.
  • 8Bertino E, Bettini C, Ferrari E, Samarati P. An access control model supporting periodicity constraints and temporal reasoning.ACM Trans. on Database Systems (TODS), 1998,23(3):231-285.
  • 9National Computer Security Center. A guide to understanding covert channel analysis of trusted systems. Technical Report,NCSC-TG-030, National Computer Security Center, 1993.
  • 10DE BL, LaPadula LJ. Secure computer systems: Unified exposition and multics interpretation. Technical Report, MTR-2997,Bedford: MITRE Corporation, 1976.

共引文献32

同被引文献26

  • 1江伟,陈龙,王国胤.用户行为异常检测在安全审计系统中的应用[J].计算机应用,2006,26(7):1637-1639. 被引量:13
  • 2黄力.数据挖掘理论在安全审计分析中的应用[J].微计算机信息,2007,23(27):199-200. 被引量:4
  • 3Han Jiawei, Micheline Kamber.数据挖掘:概念与技术[M].3版.北京:机械工业出版社,2012.
  • 4韩国强.中国人民银行信息系统审计探索,金融时报[N].2010年.
  • 5张云强.电力企业信息安全风险管理项目的应用研究.华北电力大学[N].
  • 6McKenna R. Danger of the insider threat[ J]. Infosecurity,2007(2) :5 - 15.
  • 7Wood B J. An insider threat model for adversary siumlation[ C]. Proceedings of a workshop with title “Research on Mitigating the Insider Threat to Information Systems' Arlington VA ,2000.
  • 8Parker D B. Fighting computer crime: a nes framework for protecting information[M]. New York: John Wiley & Sons, 1998.
  • 9Park J S, Ho S M. Composite role-based monitoring (CRBM) for countering insider threats[ C] . Proceedings of the Intelligence and Security Informatics, USA,2004.
  • 10Indrajit R, Poolsapassit N. Useing attack trees to identify malicious attacks from authorized insiders[ J] . Proceedings of the Computer Security—ESORICS,2005 ,38(1) :231 -246.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部