期刊文献+

电力监控系统脆弱性评估模型研究 被引量:3

Grid Baseline Security Evaluation
下载PDF
导出
摘要 针对目前电力系统脆弱性缺乏有效的评估机制和方法,根据电力监控系统的特点,对安全需求多样性和业务流程协同性造成的脆弱性评估难点进行分析,结合电力监控系统的信息结构,定义满足要求的脆弱性分析模型和量化模型,通过构建典型的评估算例,验证脆弱性评估模型的有效性。 Currently,grid system is lack of effective information security evaluation mechanisms and methods.According to the characteristics of the grid system,this paper analyzes the difficulty of evaluation for diversity of security requirements and cooperation of operation flow.Combining with structure of grid monitor system,this paper defines vulnerability analysis model and ration model,and validities the of model by constructing evaluation case.
出处 《计算机与数字工程》 2014年第1期107-111,共5页 Computer & Digital Engineering
关键词 电力监控系统 脆弱性 攻击图 grid monitor system vulnerability attack graph
  • 相关文献

参考文献3

二级参考文献14

  • 1潘明惠,偏瑞琪,李志民,陈学允.电力系统信息安全应用研究[J].中国电力,2001,34(S1):46-49. 被引量:13
  • 2张曾科(ZhangZengke).模糊数学在自动化技术中的应用(TheApplicationofFuzzyMathematicsinAutomationTechnology),Tsinghua University Press)[M].北京:清华大学出版社( Beijing,1997..
  • 3Dacier M,Deswarte Y,Kaaniche M.Quantitative assessment of operational security models and tools.Technical Report,96493,LAAS,1996.
  • 4Ortalo R,Deswarte Y.Information systems security:Specification and quantitative evaluation.Technical Report,DeVa ESPRIT Long Term Research Project No.20072,the 2nd Year Report,LAAS-CNRS & INRIA,1997.561-584.
  • 5Ortalo R,Deswarte Y,Ka(a)niche M.Experimenting with quantitative evaluation tools for monitoring operational security.IEEE Trans.on Software Engineering,1999,25(5):633-650.
  • 6Swiler LP,Phillips C,Gaylor T.A graph-based network-vulnerability analysis system.Technical Report,SANDIA Report No.SAND 97-3010/1,1998.
  • 7Sheyner O.Scenario graphs and attack graphs[Ph.D.Thesis].Pittsburgh:Carnegie Mellon University,2004.
  • 8Sheyner O,Haines J,Jha S,Lippmann R,Wing JM.Automated generation and analysis of attack graphs.In:Hinton H,Blakley B,Abadi M,Bellovin S,eds.Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2002.273-284.
  • 9Jha S,Sheyner O,Wing JM.Minimization and reliability analyses of attack graphs.Technical Report,CMU-CS-02-109,Carnegie Mellon University,2002.
  • 10Cimatti A,Clarke E,Giunchiglia F,Roveri M.NuSMV:A new symbolic model verifier.In:Halbwachs N,Peled D,eds.Proc.of the 11th Conf.on Computer-Aided Verification (CAV'99).LNCS 1633,Trento:Springer-Verlag,1999.495-499.

共引文献74

同被引文献45

  • 1梁宁波.电力监控系统漏洞隐患排查及风险管理技术研究[J].自动化博览,2019,36(S02):41-45. 被引量:3
  • 2李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1238
  • 3Tanaka H, Matsuura K, Sudoh O. Vulnerability and information security investment: An empirical analysis of e-local government in Japan [J]. Journal of Accounting and Public Policy, 2005, 24 ( 1 ) : 37- 59.
  • 4Gupta M. Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach [J]. Decision Support Systems, 2006, 41(3) : 592-603.
  • 5Cavusoglu H, Cavusoglu H, Zhang J. Security patch management: Share the burden or share the damage? [J]. Management Science, 2008, 54(4): 657-670.
  • 6Cavusoglu H, Raghunathan S, Cavusoglu H. Configuration of and interaction between information security technologies., the case of firewalls and intrusion detection systems [J]. Information Systems Research, 2009, 20(2): 198-217.
  • 7XIA Zheng-you, ZHANG Shi-yong. A kind of network security behavior model based on game theory [C] // Parallel and Distributed Computing, Applications and Technologies, PDCAT 2003 Proceedings. Los Alamitos : IEEE Computer Society, 2003:950-954.
  • 8Cavusoglu C, Mishra B, Raghunathan S. The value of intrusion detection systems in information technology security architecture [J]. Information Systems Research, 2005, 16(1):28-46.
  • 9Yue W T, Cakanyildirim M. Intrusion prevention in information systems: Reactive and proactive responses [J]. Journal of Management Information Systems, 2007, 24(1):329-353.
  • 10Ogut H, Cavusoglu H, Raghunathan S. Intrusion- detection policies for IT security breaches [J]. INFORMS Journal on Computing, 2008, 20(1) : 112- 123.

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部