期刊文献+

网络生存性评估模型的仿真分析 被引量:3

Simulation Analysis of Network Survivability Assessment Model
下载PDF
导出
摘要 在准确评估网络性能的研究中,网络生存性是指在网络遭受攻击、故障或意外事故时,网络能够及时完成关键任务的能力。传统的评估方法,在面对随机攻击的情况下,设定的网络指标权重主观性较强,且难以适应时刻变化的网络环境造成评估不准。为了避免传统算法的缺陷,提出了一种卡尔曼滤波网络生存性评估方法。对网络资源进行区域划分,将网络分割为不同的子区域,分别对子区域进行计算,从而降低网络生存性评估计算的复杂度。利用卡尔曼滤波方法,建立网络生存性评估模型,从而完成网络生存性评估。实验结果表明,利用改进算法建立网络生存性评估模型,能够提高网络评估模型的适应性,从而有效提高了评估模型在不同网络环境下的评估能力。 Research the accurate evaluation method of network survivability.In order to avoid the defects of traditional algorithm,the paper proposed a network survivability evaluation method based on Kalman filtering algorithm.The network resources were divided into different areas and the sub areas were calculated respectively to reduce the complexity of the network survivability evaluation calculation.Using Kalman filtering method,network survivability evaluation model was established,so as to complete the network survivability evaluation.Experimental results show that the algorithm can enhance the adaptability of evaluation model,thus effectively improve the assessment model in different assessment of the ability under the network environment.
作者 卢山
出处 《计算机仿真》 CSCD 北大核心 2013年第9期270-273,共4页 Computer Simulation
关键词 网络生存性 评估模型 适应性 Network survivability Evaluation model Adaptability
  • 相关文献

参考文献10

二级参考文献55

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2王艳春,张晨霞.无线网络安全研究[J].齐齐哈尔大学学报(自然科学版),2005,21(2):76-78. 被引量:15
  • 3刘胜航,张翔,曹旭平.基于层次分析法的网络风险状态评估模型[J].计算机安全,2006(2):19-21. 被引量:9
  • 4Schneier B.Secrets and lies:digital security in a networked world[M].New York:John Wiley and Sons,2000.
  • 5Evans S,Heinbuch D,Wallner J,et al.Risk-based systems security engineering stopping attacks with intention[J].IEEE Security & Privacy,2004,2(6):59-62.
  • 6Moore A P,Ellison R J,Linger R C.Attack modeling for information security and survivability,CMU/SEI-2001-TN-001[R].Software Engineering Institute,2001:54-55.
  • 7B Schneier.Attack Trees:Modeling Security Threats[J].Dr Dobb's Journal, 1999.
  • 8G Helmer,J Wong,Mark Slagell et al.A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System[C].In:Symposium on Requirements Engineering for Information Security,2001-03.
  • 9M Howard,D LeBlanc.Writing Secure Code[M].Microsoft Press,2001.
  • 10F Moberg.Security Analysis of an Information System Using an Attack Tree-Based Methodology[D].Master's Thesis.Department of Computer Engineering,Chalmers University of Technology,Sweden,2000.

共引文献138

同被引文献16

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部