期刊文献+

第三方支付系统威胁树信息安全评估研究 被引量:4

Assessment of third-party payment security using attack tree
下载PDF
导出
摘要 在全面分析第三方支付安全事件的基础上,基于威胁树理论构建了第三方支付威胁树风险评估模型,并给出了威胁树的权值计算算法以及最小威胁树修剪算法,最后运用此模型和算法选取典型的第三方支付系统进行了实例评估,对评估结果深入分析的基础上提出了第三方支付系统的安全防范对策建议。结果表明,该评估模型能有效地找到第三方支付系统的威胁路径和风险点,能为第三方支付系统安全的改进和用户选择提供参考。 Based on the analysis of security events occurring to the third-party payment system, this paper proposed a third- party payment attack tree model by using attack tree theory, as well as algorithms about attack tree weights calculation and attack tree pruning. By using the model,it implemend security assessment on typical third-party payment system, also gave secu- rity countermeasures on the basis of analysis of the evaluation results. The conclusion shows that the model can effectively find out the threat route and risk point of the third-party payment system, and give a support to the security improvements and users' choosing.
作者 李二亮
出处 《计算机应用研究》 CSCD 北大核心 2014年第4期1204-1207,1211,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(71272234) 河南省教育厅人文社会科学青年项目(2012-QN-063)
关键词 第三方支付系统 支付流程 风险评估 威胁树 third-party payment system payment process risk assessment attack tree
  • 相关文献

参考文献11

  • 1中国网络支付安全状况报告[R].北京:中国互联网络研究中心,2012.
  • 2《支付机构互联网支付业务管理办法》征求意见稿[R].北京:中国人民银行,2012.
  • 3KIM C S, GALLIEHS R D,SHIN N,et al. Factors influencing Inter-net shopping value and customer repurchase intention [J]. ElectronicCommerce Research and Applications, 2012,11 (4) :374-387.
  • 4JORIS C,VALENTIN D,DANNY D C,et al. On the security of to-day* s online electronic banking systems [J]. Computers & Securi-ty, 2002, 21(3) :253-265.
  • 5PENNATHUR A K . “ Clicks and bricks” e-Risk management forbanks in the age of the Internet [J]. Journal of Banking & Fi-nance, 2001, 25(11) :2103-2123.
  • 6刘凯.第三方支付系统客户端的安全风险1及防范机制[J].北京信息科技大学学报,2011,26( 1) =30-35.
  • 7GB/T 20984-2007.信息安全技术信息安全风险评估规范[S].中国国家质量监督检验检疫局,2007.
  • 8冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 9SCHNEIER B. “Attack trees”,secrets and lies [M]. New York:Wi-ley, 2000:318-333.
  • 10甘早斌,吴平,路松峰,李瑞轩.基于扩展攻击树的信息系统安全风险评估[J].计算机应用研究,2007,24(11):153-156. 被引量:22

二级参考文献51

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2张军,熊枫.网络隐私保护技术综述[J].计算机应用研究,2005,22(7):9-11. 被引量:22
  • 3王宇,卢昱.利用攻防树实现网络安全风险分析及成本/效益控制[J].计算机应用与软件,2006,23(4):11-12. 被引量:2
  • 4周伟,王丽娜,张焕国.一种基于攻击树的网络攻击系统[J].计算机工程与应用,2006,42(24):125-128. 被引量:7
  • 5王永杰,刘进,陈志杰,鲜明,王国玉.一种计算机网络脆弱性评估系统的设计[J].计算机工程,2006,32(17):200-202. 被引量:7
  • 6XU Toby, CAI Ying. Feeling-based location privacy protection for location-based services[C]//Proc of the 16th ACM Conference on Computer and Community Security. New York:ACM, 2009:348-357.
  • 7TRONCOSO C, DANEZIS G. The Bayesian traffic analysis of mix networks[C]//Proc of the 16th ACM Conference on Computer and Community Security. New York:ACM, 2009:369-379.
  • 8KRUMM J. Inference attacks on location tracks[C]//Proc of the 5th International Conference on Pervasion Computing.Berlin:Springer-Verlag, 2007:127-143.
  • 9FREUDIGER J, RAYA M, FELEGYHAZI M, et al. Mix-zones for location privacy in vehicular networks[C]//Proc of ACM Workshop on Wireless Network for Intelligent Transportation System . 2007.
  • 10ZHOU Zhi, CHOONG Y K. Anoymizing geographic Ad hoc routing for preserving location privacy[C]//Proc of the 3rd International Workshop on Mobile Distributed Computing. [S.l.] :IEEE Computer Society, 2005.

共引文献367

同被引文献24

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部