期刊文献+

基于信息流的资产识别及其重要性评估方法研究

Assets Recognition and Importance Assessment Based on Information Flow
下载PDF
导出
摘要 信息资产识别及其重要性评估是信息安全风险评估过程中的一个重要环节。文章基于信息流来对以信息处理和信息传递为主的业务流程系统进行资产识别和重要性评估研究。文中首先利用Petri网来分析以信息为处理对象的业务流程系统,识别业务流程中所涉及的信息资产,通过信息传递将不同的信息资产连接起来,这样信息资产就被转化为一个相互连接的有向网络图,然后文章提出Frequency Rank算法并结合信息安全等级保护的内容来对有向网络图中所包含的信息资产节点的重要性进行评估。实验结果表明:文章提出的方案能够准确的计算出信息资产重要性,符合实际的情况。 Information assets recognition and its importance assessment is a key step in information security assessments. This paper proposes a method based on information flow to give a solution. Firstly, we use Petri Nets theory to analyze the business process, it is beneifcial for us to recognize assets' nodes and transform all information assets into a directed graph. Secondly, combined with classiifed protection of information system, an algorithm called FrequencyRank is put forward to calculate the value of each node in the directed graph, the value of each node represents its importance in the graph. Experiments show that the solution in this paper can accurately get the importance of each node, and also it is consistent with the actual situation.
作者 韦峰 蒋凡
出处 《信息网络安全》 2014年第12期83-87,共5页 Netinfo Security
关键词 资产识别 重要性评估 PETRI网 FrequencyRank算法 等级保护 assets recognition importance assessment Petri Nets FrequencyRank algorithm classiifed protection
  • 相关文献

参考文献7

二级参考文献17

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2赵冬梅,张玉清,马建峰.网络安全的综合风险评估[J].计算机科学,2004,31(7):66-69. 被引量:23
  • 3GB/T20984--2007信息安全技术信息安全风险评估规范[s].北京:中国标准出版社,2007.
  • 4Satty T L. The Analytic Hierarchy Process [M]. New York, USA: McGraw-Hill Companies, 1980.
  • 5Qu W, Zhang D Z. Security metrics, models and application with SVM in information security management [C]//Proceedings of the Sixth International Conference on Machine [.earning and Cybernetics. Hong Kong, China: IEEE Press, 2007: 3234-3238.
  • 6Vapnik V. The Nature of Statistical Learning Theory [M]. New York, USA: Springer-Verlag, 1995.
  • 7Quinlan J R. C4.5: Programs for Machine Learning [M]. San Mateo, USA: Morgan Kaufmann Publishers, 1993: 22- 24.
  • 8Yang Y X, Wang R, Liu Y, et al. Solving P2P traffic identification problems via optimized support vector machines [C]// 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA2007), Amman, Jordan: IEEE Computer Society Press, 2007:165 - 171.
  • 9史美林,清华大学学报,1998年,38卷,增1期,30页
  • 10Wu Shangguang,ProcInternational Conference on Com municationTechnology,1996年,187页

共引文献81

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部