期刊文献+

可重构安全承载网络构建与重构算法研究 被引量:1

Research on reconfigurable security carrying network construction and reconfiguration algorithm
下载PDF
导出
摘要 现有互联网安全体系结构僵化且效率低下。基于"以可变的有限节点资源支持多样安全应用需求、以内置的安全结构提供多级安全保障"这一认识,避免单一追求高安全等级或高服务质量的简单模式,提供更高的灵活性和可扩展性,提出一种基于重构的安全业务—服务—构件模型,并在此基础上给出可重构网络安全体系的初步构想和具有多级安全保障的可重构安全承载网络结构,给出了可重构安全承载网络构建及重构算法。仿真结果验证了算法的有效性和性能。 Current Internet security architecture is fixed and exhibits low efficiency. Based on the thinking of "supporting di- verse security applications with the variable limited node resources and providing multilevel security guarantee by inherent se- curity architecture", avoiding limitations of traditional model aiming at pursuing high security quality of service and ensuring security by providing more flexibility and scalability, this paper first presented a network reconfiguration-oriented security busi- ness-services-components model, and gave a preliminary conception of reconfigurable network security architecture as well. Then this paper proposed a novel security structure which was named reconfigurable security carrying network ( RSCN for short) to provide muhilevel security guarantee. At last, it gave the construction algorithm and reconstruction algorithm of RSCN. The simulation results show that the algorithms are effective.
出处 《计算机应用研究》 CSCD 北大核心 2014年第4期1167-1171,共5页 Application Research of Computers
基金 国家"973"计划资助项目(2012CB315901 2013CB329104) 国家"863"计划资助项目(2011AA01A103 2011AA01A101 2013AA013505) 国家科技支撑计划资助项目(2011BAH19B01)
关键词 可重构网络 安全组合 多级安全 构建与重构 安全构件 reconfigurable network security composition multi-level security construction and reconfiguration security components
  • 相关文献

参考文献15

  • 1PAUL S,PAN Jian-li,JAIN R. Architectures for the future networksand the next generation internet : a survey [J]. Computer Commu-nications,2011, 34(1) :242.
  • 2AN AND A, DOGAR F,HAN Dong-su,ei al. XIA : an architecture foran evolvable and trustworthy Internet [C] //Proc of the 10th ACMWorkshop on Hot Topics in Networks. New York: ACM Press,2011 :2.
  • 3ZHANG Xin, HSIAO H C, HASKER G,et al SCION: scalability,control, and isolation on next-generation networks [C] //Proc of IEEESymposium on Security and Privacy ( SP) . [S. 1.] : IEEE Press,2011: 212-227.
  • 4ANDERSEN D G,BALAKRISHNAN H, FEAMSTER N,ei al. Ac-countable Internet protocol (AIP) [C]//Proc of ACM SIGCOMMComputer Communication Review. New York : ACM Press,2008 : 339-350.
  • 5JIAN R. Internet 3.0: ten problems with current Internet architectureand solutions for the next generation [C] //Proc of Military Communi-cations Conference. 2006 : 1-9.
  • 6PAUL S, JAIN R, PAN Jian-li,et al. Multi-tier diversified servicearchitecture for Internet 3. 0 : the next generation Internet [D]. ST.Louis : Washington University,2010.
  • 7SNOEREN A C, KOHNO Y, SAVAGE S,et al. NeTS-FIND^enab-ling defense and deterrence through private attribution [D]. Seattle :Washington University, 2007.
  • 8ALLMAN M, RABINOVICH M, WEAVER N. NeTS: FIND: collab-orative research: relationship-oriented networking [D]. Seattle :. Washington University ,2007.
  • 9SESHAN S,WETHERALL D,KOHNO T. Collaborative researchNeTS-FIND: protecting user privacy in a network with ubiquitouscomputing[D]. Seattle: Washington University,2007.
  • 10Workshop on measurability of trustworthiness of complex ICT systemsand services[R]. Brussels: [s. n.] , 2009.

二级参考文献56

  • 1JURCA Dan,FROSSARD Pascal.Media-specific rate allocation in heterogeneous wireless networks[J].Journal of Zhejiang University-Science A(Applied Physics & Engineering),2006,7(5):713-726. 被引量:1
  • 2Andersen D G,Balakrishnan H,Feamster N.Accountable Internet protocol//Proceeding of the ACM SIGCOMM2008 Conference on Data Communication.Seattle,USA,2008:339-350.
  • 3Mosharaf N M,Chowdhury Kablr,Boutaba Raouf.Network virtualization:State of the art and research challenges.IEEE Communication Magazine,2009,47(7):20-26.
  • 4Kim Changhoon,Caesar Matthew,Rexford Jennifer.Floodless in SEATTLE:A scalable ethernet architecture for large enterprises//Proceedings of the SIGCOMM 2008.Washington,USA,2008:3-14.
  • 5Amir-Hamed Mohsenian-Rad,Vincent W S Wong,Juri Jatskevich,Robert Schober.Optimal and autonomous incentive-based energy consumption scheduling algorithm for smart grid //Proceedings of the IEEE ISGT2010.Washington,USA,2010:1-6.
  • 6Wang Feng,Xiong Yongqiang,Liu Jiangchuan.mTreebone:A collaborative tree-mesh overlay network for multicast video streaming.IEEE Transactions on Parallel and Distributed Systems,2010,21(3):379-392.
  • 7Tennenhouse David L,David J.Wetherall towards an active network architecture.ACM SIGCOMM Computer Communication Review,2007,37(5):81-94.
  • 8Zhang D,Adelman D.An approximate dynamic programming approach to network revenue management with customer choice.Transportation Science,2009,43(3):381-394.
  • 9Bouabence G,Jelger C,Tschudin C.Virtual network stacks//Proceeding of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow.Seattle,USA,2008:45-50.
  • 10Zhu Y,Ammar M.Algorithms for assigning substrate network resources to virtual network components//Proceedings of the IEEE INFOCOM 2006.Barcelona,2006:1-12.

共引文献50

同被引文献13

  • 1BONGARD J,LIPSON H. Automated reverse engineering ofnonlinear dynamical systems [J]. Proc natl acad sci,2007,104(24):9943-9948.
  • 2YU D,RIGHERO M,KOCAREV L. Estimating topology ofnetworks [J]. Phys rev letters,2006,97(18):188701-1-4.
  • 3GARDNER T S,d BERNARDO D,LORENZ D,et al. Infer.ring genetic networks and identifying compound mode of actionvia expression profiling [J]. Science,2003,301(5629):102-105.
  • 4GEIER F,TIMMER J,FLECK C. Reconstructing gene.regula.tory networks from time series, knock . out data, and priorknowledge [J]. BMC Syst Biol,2007,1(1):11-20.
  • 5SUPEKAR K,MENON V,RUBIN D. Network analysis of in.trinsic functional brain connectivity in Alzheimer’s disease [J].PLoS Comput Biol,2008,4(6):e1000100.
  • 6WANG W X,LAI Y C,GREBOGI C,et al. Network recon.struction based on evolutionary . game data via compressivesensing [J]. Phys Rev X,2011,1(2):1-7.
  • 7WANG W X,YANG R,LAI Y C,et al. Predicting catastro.phes in nonlinear dynamical systems by compressive sensing[J]. Phys Rev Letters,2011,106(15):1-4.
  • 8WANG W X,YANG R,LAI Y C,et al. Time.series basedprediction of complex oscillator networks via compressivesensing [J]. EPL,2011,94(4):1-6.
  • 9杨涵新,汪秉宏.复杂网络上的演化博弈研究[J].上海理工大学学报,2012,34(2):166-171. 被引量:14
  • 10蔡霞,马社祥,孟鑫.启发式重构算法在压缩传感中的应用研究[J].计算机应用研究,2012,29(11):4232-4234. 被引量:3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部