期刊文献+

基于马尔可夫的检查点可信评估方法 被引量:4

Checkpoint trust evaluation method based on Markov
下载PDF
导出
摘要 为了发现软件的脆弱点,通过动态监测行为,对软件及其模块在一段时间内运行的可信状况进行研究,提出了基于马尔可夫的检查点可信评估模型。模型通过在软件行为轨迹中织入若干检查点来反映软件运行的行为表现,然后对检查点可信程度进行等级划分,通过马尔可夫模型及检查点权重反映检查点可信情况,最后综合每个检查点的可信情况得到软件整体的可信性。实验结果表明该模型能够有效反映软件中各部分可信情况,验证了模型的合理性和有效性。 According to the trust evaluation of software and its modules after running for a period of time a checkpoint trust evaluation model was presented based on Markov to find the vulnerability of software by monitoring software behavior dynamically. The model reflected the software running situation by some checkpoints worked in the software behavior trace, then divided some trust levels to reflect the checkpoint trusted situation by the Markov model and the weight of checkpoint, and finally synthesized the checkpoint trusted situation to determine the software trust value.Experimental results showed that the model could effectively reflect the trusted situation of the various parts of the software, and verify the rationality and availability of the model.
出处 《通信学报》 EI CSCD 北大核心 2015年第1期230-236,共7页 Journal on Communications
基金 国家自然科学基金资助项目(61170254) 河北省自然科学基金资助项目(F2012201145) 河北省高等学校科学技术研究重点基金资助项目(H2012029)~~
关键词 软件可信评估 检查点 马尔可夫模型 混合高斯分布 software trust evaluation checkpoint Markov model Gaussian mixture model
  • 相关文献

参考文献21

二级参考文献77

共引文献1753

同被引文献39

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:252
  • 2邵建平,王玲.“拉长板”木桶原理及其运用研究[J].科技管理研究,2005,25(4):159-161. 被引量:8
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 4Rotondo S A. Trusted Computing Group[M]//Encyclopedia of Cryptography and Security. 2011 : 1331-1331.
  • 5Sekar R, Bendre M, Dhurjati D, et al. A fast automaton-based method for detecting anomalous program behaviors[C]//2001 IEEE Symposium on Security and Privacy(S&P 2001). IEEE, 2001.,144-155.
  • 6Peng N. A SVM reliability evaluation model for component- based software systems[C]//2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Au- tomation (IMSNA). IEEE, 2013 : 704-708.
  • 7Pirzadeb H, Hamou-Lhadj A. A software behaviour analysis framework based on the human perception systems:NIER track [C]//2011 33rd International Conference on Software Enginee- ring (ICSE). IEEE,2011 :948-951.
  • 8SoderstrOm O,Moradian E. Secure Audit Log Management[J]. Procedia Computer Science, 2013,22 : 1249-1258.
  • 9Josang A, Bradley D, Knapskog S J. Belief-based risk analysis [C] // Proeeedings of the second workshop on Australasian In- formation Security, Data Mining and Web Intelligence, and Soft- ware Internationalisation-Volurne 32. Australian Computer Socie- ty,Inc. ,2004:63-68.
  • 10Tian J F, Zhu Y. Trusted Software Construction Model Based on Trust Shell[J]. Advanced Materials Research, 2011,186.. 251-255.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部