期刊文献+

一种基于UML的网络安全体系建模分析方法 被引量:11

UML-Based Modeling Method of Network Security Infrastructure
下载PDF
导出
摘要 在现有法律法规和标准体系的指导下,提出了一种通用的网络安全体系框架,阐述了安全目标、安全边界、安全体系要素与安全服务和安全风险评估之间的关系.在网络安全体系框架的基础上,利用统一建模语言(Unified Modeling Language,UML)在建模表述上的强大性和通用性给出了安全目标、安全边界和安全体系要素的建模方法,以规范化安全体系的表示形式并消除沟通中的歧义性.利用建立的模型,安全管理员使用提出的网络安全建模分析方法,可以验证业务流程的目标满足性并得出可能的安全风险.最后通过一个典型网上银行网络的建模分析,验证了提出的安全体系框架和建模分析方法的有效性和合理性.相比于传统的方法,该方法建模分析要素更为全面,且推导得出的结果指导性更强. Under the guidance of existing laws, regulations and standards, a general framework of network security infrastructure is proposed. The proposed infrastructure discusseds the relations between security objectives, security boundary, security infrastructure elements and security risk assessment. Based on this infrastructure, we present our modeling approaches of security objectives, security boundary and security infrastructure elements using UML's standard and powerful modeling ability. Our modeling methods can eliminate the ambiguity in communication and make the representation of security system be standardized. Using our analysis methods, security administrators can validate how the business processes meet to the business goals and get the security risk of the system. By modeling an online banking, the proposed security framework and modeling methods' validity and rationality are verified. The proposed approach can help security administrators model the network security system in a visualization method. Based on modal logic, security administrators can deduce the logical relationships between each element and the results can guide security administrators to deploy proper security measures. Compared with the existing methods, the method of this paper is more comprehensive and has stronger guiding significance.
出处 《计算机研究与发展》 EI CSCD 北大核心 2014年第7期1578-1593,共16页 Journal of Computer Research and Development
基金 北京市自然科学基金项目(4122085) 国家"十二五"科技支撑计划基金项目(2012BAK26B01)
关键词 网络安全体系 UML建模 安全目标 安全边界 安全措施 network security infrastructure security measures UML modeling security goals security boundary
  • 相关文献

参考文献18

  • 1国家互联网应急中心.2012年我国互联网网络安全态势综述[EB/OL].http://www.cert.org.cn.2013-03-09.
  • 2Bell D E, LaPadula L J. Secure computer systems: Mathematical foundations, MTR 2547 [R]. Bedford, MA: MITRE Corp, 1973.
  • 3United States Department of Defense (DoD). Trusted computer system evaluation criteria (TCSEC), DoD 5200. 28-STD [R]. Washington DC: United States Department of Defense (DoD), 1985.
  • 4EC Advisory Group SOG-IS. Information technology security evaluation criteria (ITSEC), Version 1.2 [S/OL]. Brussels, Luxembourg: Office for Offeial Publications of the European Communities, 1991 [2013-12-03]. http://www, ssi. gouv. fr/ site documents[ITSEC/ITSEC-uk, pdf.
  • 5The International Organization for Standardization. ISO/IEC 15408 3: The common criteria for information technology security evaluation, Version 3. 1 [S/OL]. International Organization for Standardization, 2005 [2013-12-03]. http:// www. eommoncriteriaportal, org/files/ecfiles/CCPAR T3 V3.1R4. pdf.
  • 6Lesley H. Network infrastructure security [J]. Network Security, 1997, 1997(6) : 8-12.
  • 7Chakrabarti A, Manimaran G. Internet infrastructure security: A taxonomy [J]. IEEE Network, 2002, 16 (6) : 13-21.
  • 8National Security Agency. The information assurance technical framework (IATF) [EB/OL]. (2000-09-01) [2013- 12-03]. http://oai, dtic. mil/oai/oai?verb= getRecord&metadata Prefix= html&identifier = ADA393328.
  • 9王娜,方滨兴,罗建中,刘勇.“5432战略”:国家信息安全保障体系框架研究[J].通信学报,2004,25(7):1-9. 被引量:36
  • 10Torsten L, David B, Jtirgen D. SecureUML: A UML-based modeling language for model-driven security [G] //LNCS 2460: Proc of UML2002 The Unified Modeling Language. Berlin: Springer, 2002:426-441.

二级参考文献69

  • 1吴康恒,姜云飞.基于模型检测的领域约束规划[J].软件学报,2004,15(11):1629-1640. 被引量:17
  • 2张惟皎,刘春煌,李芳玉.聚类质量的评价方法[J].计算机工程,2005,31(20):10-12. 被引量:60
  • 3吴向军,姜云飞,凌应标.基于STRIPS的领域知识提取策略[J].软件学报,2007,18(3):490-504. 被引量:20
  • 4Fikes R,Nilsson N.STRIPS,A new approach to the application of theorem proving to problem solving[J].Artificial Intelligence,1971,2(3/4):189-208.
  • 5Philippe L.Algorithms for propagating resource constraints in AI planning and scheduling:Existing approaches and new results[J].Artificial Intelligence,2003,143(2):151-188.
  • 6Blum A,Furst M.Fast planning through planning graph analysis[J].Artificial Intelligence,1997,90(1/2):281-300.
  • 7Palacios H,Geffner H.From conformant into classical planning:Efficient translations that may be complete too[C] //Proc of the 17th Int Conf on Artificial Intelligence Planning and Scheduling.Menlo Park,CA:AAAI,2007,264-271.
  • 8Palacios H,Geffner H.Compiling uncertainty away:Solving conformant planning problems using a classical planner (sometimes)[C] //Proc of the 21st National Conf on Artificial Intelligence.Menlo Park,CA:AAAI,2006:900-905.
  • 9Cushing W,Bryce D.State agnostic planning graphs and their application to belief space planning[C] //Proc of the 20th National Conf on Artificial Intelligence.Menlo Park,CA:AAAI,2005,1131-1138.
  • 10Smith D,Weld D.Conformant graphplan[C] //Proc of the 15th National Conf on Artificial Intelligence.Menlo Park,CA:AAAI,1998,889-896.

共引文献99

同被引文献61

引证文献11

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部