期刊文献+

基于时间戳的责任认定原型系统分析与设计

ANALYSIS AND DESIGN OF TIMESTAMP-BASED RESPONSIBILITY IDENTIFICATION PROTOTYPE SYSTEM
下载PDF
导出
摘要 责任认定是建立在身份认证和授权管理基础上的审计机制,在网络系统安全中发挥着重要作用。针对责任认定应解决的问题,提出责任认定平台理论原型及功能模型。首先,提出使用时间戳服务对安全日志进行处理,以保证安全日志的完整性及安全性;其次,通过日志分析系统对安全日志进行数据挖掘、关联分析、行为追踪等,分析结果载入责任认定数据库,作为责任认定的依据,辅助相关人员做出判断。责任认定平台原型系统的建立将有助于责任认定平台的具体实现,可作为实际平台建设的蓝本。 Responsibility identification is an auditing mechanism established on the basis of authentication and authorisation management,and plays an important role in network security.Aiming at the problems in responsibility identification which need to be solved,we propose in our study a theoretical prototype and functional model of responsibility identification platform.First,we propose to use timestamp to handle the security log so as to ensure the integrity and security of the security log.Secondly,by using the log analysis system,we suggest to execute data mining,correlation analysis,behaviour tracking on security logs database,the analyses results will be recorded to the database of responsibility identification and cited as the basis of responsibility identification,which can assist the relative personnel to make the judgements.The establishment of the prototype system of responsibility identification will contribute to the concrete realisation of the responsibility identification platform,and can be taken as the blueprint of practical platform construction.
出处 《计算机应用与软件》 CSCD 北大核心 2012年第11期315-319,共5页 Computer Applications and Software
关键词 责任认定 时间戳 安全日志 日志分析 Responsibility identification Timestamp Security log Log analysis
  • 相关文献

参考文献7

二级参考文献27

  • 1穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 2屈定春,林原.一种新型的数据库应用──数据采掘[J].计算机应用研究,1996,13(6):8-11. 被引量:9
  • 3CNNIC.中国互联网络发展状况统计报告[EB/OL].http://www.cnnic.net.cn/download/2005/2005011801.pdf,2005-02-01/2005-03-19.
  • 4YASINSAC. Computer forensics education[J]. IEEE Security & Privacy Magazine, 2003,1(4):15-23.
  • 5KEVINMandia CHRISProsise 常晓波译.应急响应:计算机犯罪调查[M].北京:清华大学出版社,2002..
  • 6MARK Reith, CLINT Carr, GREGG Gunsch.An examination of digital forensic models[J].International Journal of Digital Evidence. 2002, 1 (3):25-28.
  • 7BRADFORD P G, BROWN M, PERFUE J,et al.Towards proactive computer-system forensics[A]. Proceedings of the International Conference on Information Technology: Coding and Computing[C].2004,648-652.
  • 8ALEC Yasinsac, YANET Manzano. Policies to enhance computer and network forensics[A].2001 IEEE Workshop on Information Assurance and Security[C].United States Military Academy:West Point, NY, 2001,289-295.
  • 9KULESH Shanmugasundaram.ForNet:A Distributed Forensics Network[EB/OL]. http://isis.poly.edu/projects/fornet/docs/pubs/mmm-acns-2003.pdf,2003-05-06/2005-03-21.
  • 10DANIELS Thomas E.A functional reference model of passive systems for tracing network traffic[J].Digital Investigation,2004,1(1):69-81.

共引文献136

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部