期刊文献+

嵌入式系统威胁与风险评估过程仿真分析 被引量:3

Embedded System Threats and Risk Assessment Process Simulation Analysis
下载PDF
导出
摘要 研究嵌入式系统威胁与风险准确评估问题。嵌入式系统与常规计算机系统不同,其结构有较大的随意性,无固定模式,当前的系统危险评估模型都是面向过程、web应用等方面进行了威胁模型的构建,较少从嵌入式系统的角度来建立威胁模型,嵌入式系统的攻击成本、技术复杂度、风险评估等因素是不能量化表述的,传统的模型针对嵌入式的评估效果不好。为了避免上述传统算法的缺陷,提出了一种基于Agent概率分布模型的嵌入式系统威胁与风险评估方法。计算嵌入式系统中节点的威胁值,从而为嵌入式系统威胁与风险评估奠定数据基础。根据Agent概率分布模型,完成嵌入式系统威胁与风险评估。实验结果表明,利用改进算法能够对嵌入式系统中的威胁与风险进行准确的评估,从而保障嵌入式系统的安全,为网络用户提供高质量的服务。 In this paper, the issues of accurate assessment method for the threat and risk of embedded system were researched. In order to avoid the defects of traditional algorithms, this paper presented a threat and risk assess ment method for embedded system based on agent probability distribution model. Firstly, in this method, the value of the node threats of embedded systems was calculated, laying the data foundation for threat and risk assessment for embedded systems. Then, according to Agent probability distribution model, the threat and risk assessment for em bedded system can be completed. Experimental results show that the improved algorithm used in threats and risk as sessment for embedded system is accurate. It can protect the security of embedded systems and provide high quality services to network users.
作者 赵竞雄
出处 《计算机仿真》 CSCD 北大核心 2014年第4期295-298,共4页 Computer Simulation
基金 中央高校基本科研业务费资助(3142014069)
关键词 嵌入式系统 威胁 风险评估 Embedded system Threats Risk assessment
  • 相关文献

参考文献9

二级参考文献29

  • 1瓦普尼克(美)著 张学工译.统计学习理论的本质[M].北京:清华大学出版社,2000..
  • 2Anderson J P. Computer security threat monitoring and surveillance [R]. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania, 1980. 4.
  • 3Dorothy E. Denning. An intousion-detedion model [J]. IEEE Transactions on Software Engineering, 1987, SE-13 (2), 222-232.
  • 4Fox K L, Henning R R. A neural network approach towards intrusion detection[C]. Washington DC: In Proceeding of 13^th National Computer Security Conference, 1990.
  • 5Bonifaco J M, Moreira E S. An adaptive intrusion detection system using neural network[M]. Brazil: UNESP, 1997.
  • 6Cannady J. Artifical neural network for misuse detection [C]. In Proceeding of the 1988 National Information Aystem Security Conference (NI-SSC' 98), 1998, 10: 5-- 8): 443-456.
  • 7Ludovic Me. Gassata. A genetic algorithm as an alternative tool for security audit trail analysis [R]. Cesson Sevigne Cedex,France: Superlec, 1996.
  • 8Crosbie M, Spafford G. Applying genetic programming to intrusion detection [R]. Purdus University : Department Computer Sciences, Coast Laboratory, 1997.
  • 9Steven A H. An immunological model of distributed detection and its application to computer security[D]. [s. 1. ] : University of New Mexico, 1999.
  • 10Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez,David Isacoff, Eugene Spafford, Diego Zamboni. An architecture for intrusion detection using autonomous agents [R]. CERIAS Technical Report 98/05, June 11,1998.

共引文献369

同被引文献26

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部