期刊文献+

数据仓库技术在网络信息安全风险评估系统中的应用

DATA WAREHOUSE TECHNOLOGY IN RISK ASSESSMENT SYSTEM OF NETWORK INFORMATION SECURITY
下载PDF
导出
摘要 本文将数据仓库技术引入到网络信息安全风险评估系统中,依据风险评估组件对评估数据的不同要求建立数据仓库。数据仓库系统采用面向主题的数据组织方式,对网络历史事件数据和网络当前状态数据,按照评估方法的不同进行归类和统一管理,以满足风险评估组件中不同评估方法对数据的需求。数据仓库从源数据到ETL过程,为评估系统进行数据分析提供了快速的数据准备,有效提高了评估的准确性和时效性。 Currently, there are common problems in information security assessment products, for example, the efficiency, the uncertainty of assessment. The reason mainly lies in that it is difficult for the assessment system to timely deal with the complicated and changeable risk factors and massive risky information in information network. Most assessment systems are compelled to pick up some important risk factors to reduce the quantities and, whereas to improving the efficiency. But the limited speed greatly reduces the reliability of assessment results. The thesis means to introduce data warehouse technology into security risk assessment of network information system and establish data warehouse based on different data required by risk assessment components. So in a subject-oriented data organization way, data warehouse system can classify and manage the historical net data and current net data to meet the data demand required by different assessment methods in risk assessment components. Therefore in the process from original data to ETL, data warehouse keeps providing efficient data preparation for the assessing system to analyze data, and effectively improve the accuracy and timeliness of assessment.
出处 《井冈山大学学报(自然科学版)》 2012年第5期59-62,共4页 Journal of Jinggangshan University (Natural Science)
基金 江西省科技厅科技支撑项目(2010BGA00900) 江西省教育厅科技计划项目(GJJ10538)
关键词 数据仓库 网络信息安全 风险评估 data warehouse information security of network risk assessment
  • 相关文献

参考文献8

二级参考文献24

  • 1王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:55
  • 2GB/T 20984-2007.信息安全技术信息安全风险评估规范[S].中国国家质量监督检验检疫局,2007.
  • 3Man Dapeng,Zhang Bing,Yang Wu,et al.A method for global attack graph generation[C]//Networking,Sensing and Control.Washington: IEEE Computer Society,2008: 236-241.
  • 4Liu Yu,Man Hong.Network vulnerability assessment using Bayesian networks[C]//Proceedings of SPIEVolume 5812,Data Mining,Intrusion Detection,Information Assurance,and Data Networks Security.Bellingham WA: SPIE,2005: 61-71.
  • 5Igor Kotenko,Mikhail Stepashkin.Attack graph based evaluation of network security[C]//Lecture Notes in Computer Science.Berlin: SPRINGERVERLAG,2006:216227.
  • 6ZHANG Baowen,Zhu Willam,Xue Zhi.Mining privilege escalation paths for network vulnerability analysis[C]//Joint of International Conference on Natural Computation and International Conference on Fuzzy Systems and Knowledge Discovery.Washington: IEEE Computer Society,2007: 56-60.
  • 7Mell P,Scarfone K,Romanosky S.A complete guide to the common vulnerability scoring system version 2.0[C/OL].Forum of Incident Response and Security Teams.USA:IEEE,2007.http://www.first.org/cvss/cvssguide.html.
  • 8杨宏宇,李勇,陈创希.基于模糊理论的信息系统风险计算[J].计算机工程,2007,33(16):44-46. 被引量:11
  • 9John M G. Fuzzy Set Computational Processes in Risk Anal- ysis[J]. IEEE Transactions on Engineering Management, 1991, 38(2):177- 178.
  • 10David R, George G. Risk: A Practical Guide for Deciding What's Really Safe and What's Dangerous in the World A- round You [D]. New York: Houghton Mifflin Company, 2002.

共引文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部