期刊文献+

网络安全风险可视化应用研究

Network Security Risk Fusion Model Based on Data Field
下载PDF
导出
摘要 针对目前网络安全态势全局信息掌握的不足,建立网络环境下的安全态势显示模型,基于全局网络定位(GNP思想),通过网络拓扑的坐标化来实现网络风险场的构建,利用主机风险评估技术和网络环境下的风险融合技术,研究网络环境下的风险态势可视化,为网络管理员全局掌握网络安全风险态势,提供直观的安全态势视图,为风险阻断和策略制定提供辅助。 As there are shortcomings of current network security risk evaluation based on global information,we build a new network security risk amalgamation model which evaluates network security factors from local to global.Based on the fuzzy evaluation and stastitical analysis,we use GNP(Global Network Position) to plot network topology,and then according to add all the relevant factors between important nodes with weight,we implement risk amalgamation effect of relevant nodes under the idea of Data Field.After building the Data Field,we found that our new model could reflect the law of risk amalgation correctly,and control the tendency of the global network security risk,and supply a straighter graph of security tendency for administrators to terminate risk propagation and set policies.
作者 涂航 佘新荷 杨灿 TU Hang,SHE Xin-he,YANG Can(1.Computing Technology Institute of China Navy,Beijing 100086,China;2.No.96411 Army PLA,Baoji 721006,China)
出处 《电脑知识与技术》 2011年第5期3028-3031,共4页 Computer Knowledge and Technology
关键词 全局网络定位 网络安全 风险可视 risk evaluation global network position risk field security tendency
  • 相关文献

参考文献11

二级参考文献83

  • 1解(亻刍),汪小帆.复杂网络中的社团结构分析算法研究综述[J].复杂系统与复杂性科学,2005,2(3):1-12. 被引量:86
  • 2郑金连,狄增如.复杂网络研究与复杂现象[J].系统辩证学学报,2005,13(4):8-13. 被引量:26
  • 3安世虎,都艺兵,曲吉林.节点集重要性测度——综合法及其在知识共享网络中的应用[J].中国管理科学,2006,14(1):106-111. 被引量:21
  • 4韩明畅,李德毅,刘常昱,李华.软件中的网络化特征及其对软件质量的贡献[J].计算机工程与应用,2006,42(20):29-31. 被引量:24
  • 5[1]Tim B. Multisensor data fusion for next generation distributed intrusion detection systems[A]. 1999 IRIS National Symposium on Sensor and Data Fusion, Laurel,USA,1999.
  • 6[2]Tim B. Intrusion systems and multisensor data fusion: creating cyberspace situational awareness[J]. Communications of the ACM, 2000, 43(4): 99~105.
  • 7[3]Martin R, Chris G.Snort users manual, Snort release 2.0.0[EB/OL].http://www.snort.org/docs/SnortUsersManual.pdf,2002-07-06.
  • 8[4]Tim B, Roger R. Defense-in-depth revisited:qualitative risk analysis methodology for complex network-centric operations[EB/OL].http://www.silkroad.com/papers/pdf/archives/defense-in-depth-revisited-original.pdf,2002-07-23.
  • 9[5]Honeynet Project.Know your enemy: statistics[EB/OL].http://www.HoneyNet.org/papers/stats/, 2001-07-22.
  • 10[1]PlanetLab Website [EB/OL].[S.l.]:[s.n.], 2005[2005-08-05]. http://www.planet-lab.org/.

共引文献268

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部