期刊文献+

电子政务外网网络安全指标体系配置研究 被引量:3

Research on Configuration of Index System of E-government Extranet Security
下载PDF
导出
摘要 该文通过对现有网络安全指标体系进行研究,针对电子政务外网的特点,考虑所有影响网络安全的因素后,建立了一个全面的通用网络安全指标体系,为电子政务外网的网络安全态势评估提供依据。通过对通用指标体系的裁剪,满足用户对不同的设备的具体需求,针对网络上不同逻辑组,文章设计了态势的聚集算法,该算法能够识别电子政务外网逻辑组下的资产并能对这些资产的安全态势进行聚合,最后通过一个实例验证了该指标体系模型的科学性与合理性。 Through the research of existing network security index system, considering the characteristics of e-government extranet and all the factors affecting network security, in this paper, a comprehensive common index system of network security was established in this paper to provide the basis for the evaluation of the e-government extranet situation. The specific needs of users to different devices were satisfied by the cutting of the common index system. An aggregation algorithm of the situation was designed for different Logical groups on the network. This algorithm can identify the assets which were belongs to the logic groups of the e-government exlranet and then to aggregate the situation of these assets. Finally, an example was given to verify the scientificity and rationality of index system model.
出处 《信息网络安全》 2011年第9期66-69,共4页 Netinfo Security
基金 国家高技术研究发展计划(863计划)资助项目(2011AA010702)
关键词 指标体系配置 资产识别 态势聚合 configuration of index system asset identification situation aggregation
  • 相关文献

参考文献4

二级参考文献14

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2于冬.基于BP神经网络的风险投资评估模型[J].科技管理研究,2005,25(9):206-208. 被引量:6
  • 3Baltimore.CMS Information Security Ri-sk Assessment Methodology[M].2002.
  • 4BASS T,GRUBER D.A glimpse into the future of id[EB/OL].(1999-11-16)[2007-04-20].http://www.usenix.org/publications/login/1999-9/features/future.html.
  • 5Carnegie Mellon's SEI.System for Internet Level Knowledge (SILK)[EB/OL].[2007-04-20].http://silktools.sourceforge.net.
  • 6SHIFFLET J.A technique independent fusion model for network intrusion detection[C]// Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics.2005,3(1):13-19.
  • 7YURCIK W,BARLOW J,LAKKARAJU K,et al.Two visual computer network security monitoring tools incorporating operator interface requirements[C]// ACM CHI Workshop on Human-Computer Interaction and Security Systems (HCISEC).New York:ACM Press,2003:54.
  • 8LAU S.The spinning cube of potential doom[J].Communications of the ACM,2004,47(6):25-26.
  • 9YURCIK W.Visualizing netflows for security at line speed:the SIFT tool suite[C/OL]// 19th Usenix Large Installation System Administration Conference(LISA),San Diego,2005.http://www.usenix.org/events/lisa05/tech/full_papers/yurcik/yurcik.pdf.
  • 10北京理工大学信息安全与对抗技术研究中心.网络安全态势评估系统技术白皮书[EB/OL].[2007-04-20].http://www.thinkor.com/product/download/网络安全态势评估系统技术白皮书2.doc.

共引文献426

同被引文献18

引证文献3

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部