期刊文献+

基于bloom filter算法的信息安全风险评估方法

The Bloom Filter Algorithm Based on the Information Security of Risk Assessment
下载PDF
导出
摘要 信息安全是企业经济效益和社会效益的保障,企业信息网络的安全越来越受到重视。针对当前信息安全方面的问题,我们提出了一种基于bloom filter算法的风险评估方法,该方案通过bloom filter算法以及加权平均算法,使得用户能够通过具体的数值对比得到相应的风险等级,最终得到一个量化的风险评估结果。 Information security is the ensure of economic and social benefits. The information network security of company has been paid more and more attention to. In view of the current information security issues, we propose a bloom filter algorithm based on risk assessment. With the bloom filter algorithm and the weighted average algorithm, the method enables users to compare specific values and get corresponding level of risk, to end up with a quantitative risk assessment.
出处 《电脑与电信》 2011年第1期44-45,共2页 Computer & Telecommunication
关键词 入侵检测 漏洞扫描 BLOOM filter算法 加权算术平均算法 intrusion detection scanning loopholes the bloom filter algorithm weighted average algorithm
  • 相关文献

参考文献2

二级参考文献11

  • 1黄鑫,庄雷.基于Jxta技术的Peer-to-Peer网络查询优化策略[J].微电子学与计算机,2004,21(8):106-110. 被引量:2
  • 2中华人民共和国计算机信息系统安全保护条例[Z].1994(2):18.
  • 3中华人民共和国公安部.GB 17859-1999,计算机信息系统安全保护等级划分准则[S].北京:中国标准出版社,1999.
  • 4Jan-Oliver Wagner,Michael Wiegand Tim Brown,et al.Open VAS Compendium.Version1.0.1 as of 20090115[EB/OL].http://www.docin.com/p32762706.html.Key words:information security,classification protection,vulnerability scanning,Extensibility.
  • 5Ion Stoica,Robert Morris,David Karger,et al.Chord:a scalable peerto-peer lookup service for internet applications[A].Proceedings of ACM SIGCOMM[C].San Diego,California,USA.ACM Press,August 2001:149~160
  • 6Adjie-Winoto W,Schwartz E,Balakrishnan H,et al.The design and implementation of an international naming system.Proc.Of 17th ACM Symposium on Operating System Principles,Kiawah Island Resort,SC,ACM Press,1999:186-201
  • 7Bloom B.Space/time trade-offs in hash coding with allowable errors.Communications of the ACM.1970,13(7):422~426
  • 8Sean C Rhea,John Kubiatowicz.Probabihstic location and routing.Proc.of INFOCOMM,Las Vegas,USA,IEEE Computer Society Press,2002:1248~1257
  • 9Cserwinski S E,ZMo B Y,Hodes T D,et al.An architecture for a secure service discovery service.Proc.of Mobi-Com-99.1999:24~35
  • 10Hsiao P H.Geographical region summary service for geographical muting.Proc.Of ACM International Symposium on Mobile ad hoe Networking and,Computing,Newport,Rhode Island,USA,ACM Press,2001:263~266

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部