期刊文献+

Behavior Measurement Model Based on Prediction and Control of Trusted Network 被引量:5

Behavior Measurement Model Based on Prediction and Control of Trusted Network
下载PDF
导出
摘要 In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones. In order to construct the trusted net-work and realize the trust of network behavior, a new multi-dimensional behavior measurement model based on prediction and control is presen-ted. By using behavior predictive equation, indi-vidual similarity function, group similarity func-tion, direct trust assessment function, and gener-alized predictive control, this model can guarantee the trust of an end user and users in its network. Compared with traditional measurement model, the model considers different characteristics of vari-ous networks. The trusted measurement policies established according to different network envi-ronments have better adaptability. By construc-ting trusted group, the threats to trusted group will be reduced greatly. Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group. The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model re-sists viruses and Trojans more efficiently than ol-der ones.
出处 《China Communications》 SCIE CSCD 2012年第5期117-128,共12页 中国通信(英文版)
基金 This work was supported by the National Basic Research Pro-gram of China under Crant No.2007CB311100 Funds of Key Lab of Fujlan Province University Network Security and Cryp- toll1009 the National Science Foundation for Young Scholars of China under Crant No.61001091 Beijing Nature Science Foundation under Crant No. 4122012 "Next-Generation Broad-band Wireless Mobile Communication Network" National Sci-ence and Technology Major Special Issue Funding under Grant No. 2012ZX03002003 Funding Program for Academic tturmn Resources Development in Institutions of Higher Learning Under the Jurisdiction of Beijing Municipality of Chi-na.
关键词 广义预测控制 可信网络 计量模型 模型预测 行为 测量模型 最终用户 预测方程 trusted network behavioral predic-tive control similarity trust measurement
  • 相关文献

参考文献21

  • 1SHEN Changxiang, ZHANG Huanguo, WANG Huai-nfin. Research and Development of the Trusted Confuting[J]. Scientia Sinica(Infortmtions), 2010, 28(5): 139-166.
  • 2ZHANG Huanguo, LUO Jie, J1N Gang. Development of Trusted Computing Research. Journal of Wuhan University (Natural Science Edition), 2006, 5:513 - 518.
  • 3Trusted Computing Gaoup, TCG Specification Architecture Overview[EB/OL]. Revision 1.4, 2007.
  • 4TNC [EB/OL]. https :/Iwww. trustedcorqoutinggroup, org/ groups/network/.
  • 5RHEINGOLD H. The V'n'tual Conmmnity: Homesteading on the Electronic Frontier[M]. New York: Addison-Wesley, 2000.
  • 6COLWILLA C. Hunman Factors in Inforn mation Security: The Insider Threat-Who Can You Trust These Days? [J]. Infor- rr~tion Security Technical Report, 2009, 14(4): 186-196.
  • 7WANG Wei. Ceneralized Predictive Control Theory and Appfication[M]. Beijing: Science press, 1998.
  • 8DUSENBERY D. Living at MicroScale: The Unexpected Physics of Being Sn,all[M]. Harvard University Press, Cam- bridge, Mass, 2009.
  • 9LEI Yao. The Discussion of Hunman-Organization Behavior in Complex Systems. Journal of Tsinghua University (Phi- losophy and Social Sciences), 2000(5): 38-42.
  • 10RopertBrown. Croup Process [M]. Beijing: China Light In- dustry Press, 2007.

同被引文献33

  • 1吕晓鹏,王文东,龚向阳,马建.一种基于Tracker端偏向邻居选择的距离感知BitTorrent系统(英文)[J].China Communications,2011,8(2):75-85. 被引量:2
  • 2SHEN ChangXiang,ZHANG HuangGuo,FENG DengGuo,CAO ZhenFu,HUANG JiWu.Survey of information security[J].Science in China(Series F),2007,50(3):273-298. 被引量:39
  • 3OOD. Trusted Computer System Evaluation Criteria (TCSEC) [S]. OOD520028-STD, December 1985.
  • 4BAUMANN A, BARHAM P, DAGAND P, et al. The Mul?tikernel: A New OS Architecture for Scalable Multicore Sys?tems [C]// Proceedings of the ACM SIGOPS 22nd Symposi?um on Operating Systems Principles: October 11-14,2009, Big Sky, Montana. ACM Press, 2009: 29-44.
  • 5TCG. TCG Specification Architecture Overview [S]. Trusted Computing Group.
  • 6ZHANG Shibin, XU Chunxiang, IDNG Yaxing. Study on Terminal Trusted Model Based on Trusted Computing [C]// Proceedings of 2011 International Conference on Internet Technology and Applications: August 16-18,2011, Wuhan, China. IEEE Press, 2011: 1-4.
  • 7ZHOU Hongwei, YUAN Jinhui. Formal Analysis of Trusted Computing: One Case Study [C]// Proceedings of 2011 3rd International Conference on Commmications and Mobile Computing: April 18-20, 2011, Qingdao, China. IEEE Press, 2011: 55-58.
  • 8NICK L. PErRONI J, TIMOTHY F, et al. Copilot-A Copro?cessor-Based Kernel Runtirre Integrity Monitor [C]// Pro?ceedings of the 13th Conference on USENIX Security Sym?posium: August, 2004, San Diego, CA. USENIX Association Berkeley 2004, 13: 13-24.
  • 9WANG Dan, Gill Xilan, FU Lihua. Dynamic Trust Measure?trent Model Based on Information Track Technology [C]// Proceedings of 2011 International Conference on Computer Science and Service System: June 27-29,2011, Nanjing Chi?na. IEEE Press, 2011: 3213-3216.
  • 10WIUlAM W, DAVID S, PASCALE P. The Sandbox for A?nalysis: Concepts and Methods [C]// Proceedings of ACM Proceedings of the SIGCHI Conference on Hunan Factors in computing systems: April, 2006. Montreal, Quebec, Can?ada. ACM Press, 2006: 801-810.

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部