期刊文献+

基于等级保护的地方政府网络信息安全告警设计研究

Research on Notification Alert Design of the Local Governments Network Information Security Based on Hierarchical Protection
下载PDF
导出
摘要 政府网络是在物理通信网络连接的基础上,采用符合Internet技术标准的面向政府机关服务的网络,分为政务内网、外网、WEB网站。政府网络信息安全告警体系建设是具有战略性意义的项目,它的实施对政府机构转变管理职能和工作方式,提高服务管理水平,打造24小时服务型政府、建设高效规范的工作机制产生重要的影响。地方政府网络信息安全告警结合等级保护制度,采用人工神经网络计算模型及建立贝叶斯网络,并运用大规模并行处理和自学习自组织非线性动力学方法,探索出一套统一归一化的、具备五级告警机制的、可量化分析的政府网络信息安全告警体系。 The local governments network is a government agencies service-oriented network, which uses inter- net technical standards based on physical communication network connection. It consists of government internal network, external network and WEB sites. The construction of the governments network information security sys- tem is a project with strategic significance. Implementation of the system plays a key role in transformation of management functions and working styles, improvement of service management and development of a 24 hour- service-oriented government and high efficient and standard mechanism. By combining hierarchical protection system, using artificial neural networks computation model, developing Bayesian networks, and applying large- scale parallel processing and nonlinear dynamical methods of self-study and self-organization, a unified and nor- malized governments network information security system with five-level notification alert mechanism and indica- tive quantitative analysis is developed
出处 《南宁职业技术学院学报》 2013年第5期97-100,共4页 Journal of Nanning College for Vocational Technology
基金 广西政府网络信息安全告警与态势评估体系建设研究(桂工信投资〔2012〕440号)
关键词 等级保护 地方政府网络 信息安全告警 人工神经网络 分级管理 hierarchical protection the local governments network notification alert of information security artificial neural networks hierarchical management
  • 相关文献

参考文献7

二级参考文献11

  • 1吴昌伦,王毅刚.信息安全管理与管理体系[J].中国计算机用户,2003(41):38-38. 被引量:3
  • 2Ning P, Cui Y, Reeves D. Constructing Attack Scenarios through Correlation of Intrusion Alerts[C]. In: Proc. of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2002: 245-254.
  • 3Ning P, Cui Y, Reeves D, et al. Tools and Techniques for Analyzing Intrusion Alerts[J]. ACM Transactions on Information and System Security. 2004, 07(02) 273-318.
  • 4Mannila H, Toivonen H, Verkamo A. Discovery of frequent episodes in event sequences[J]. Data Mining and Knowledge Discovery. 1997, 01(03) 259-289.
  • 5中国互联网络发展状况统计报告[EB/OL].北京:中国互联网络信息中心.http://www.cnnic.net.cn/uploadfiles/pdf/2010/1/15/101600.pdf.2010-1-15.
  • 6Shane Greenstein.The Commercialization of Information Infrastructure as Technological Mediation The Internet Access Market[J].Information Systems Frontiers, 2000,4(4):329-348.
  • 7胡啸.信息安全标准化工作概述[J].信息技术与标准化,2008(7):23-28. 被引量:2
  • 8朱英菊,陈长松.信息安全管理有效性的测量[J].信息网络安全,2009(1):87-88. 被引量:5
  • 9傅星.校园信息化背景下的信息安全[J].首都经济贸易大学学报,2010,12(4):123-128. 被引量:16
  • 10朱继锋,赵英杰,杨贺,张升波.等级保护思想的演化[J].信息安全与通信保密,2011,9(4):70-73. 被引量:14

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部