期刊文献+

基于时间状态维的信息度量模型研究

Study of the Information Measurement Model Based on the Dimension of Time State
下载PDF
导出
摘要 网络空间中大数据海量汇聚,交互信息中隐藏的行为模式已对网络安全提出了全新挑战。如何分析网络节点规模、信息激增和恶意威胁等带来的网络安全问题,已成为当前网络防御的重要研究内容。文章从已有网络安全框架基础上,着重考虑终端用户行为模式,通过描述信息状态,增加时间状态维来度量异构群体中节点交互所带来的信息变化,建立了基于结构化的动态评估框架和信息度量模型,对于维护网络信息秩序,适时引导网络认知环境,有效解决网络防御有关问题具有重大指导意义。 The patterns of behavior hidden in the interactive information have put forward new challenges to network security because of a large volume of big data in the cyberspace. The research on how to analyze the network security problems brought by the size of network nodes, information surge and hostility complaint is both the focus and difficulty in network defense. This article describes the information state and takes users behavior into consideration to measure the information changes brought by the interaction nodes in heterogeneous population based on the existing network security framework. The structured framework for dynamic evaluation model based on metrics and information is proposed, which is of great value for maintaining the network information order, guiding the cognitive network environment in a timely manner, and solving the problems of network defense.
出处 《国防科技》 2015年第1期35-39,共5页 National Defense Technology
关键词 网络防御 时间状态维 信息状态 信息度量 network defense dimension of time state information state information measurement
  • 相关文献

参考文献13

  • 1宋晓宇.一种基于AHP的信息安全威胁评估模型研究[J].计算机光盘软件与应用,2014,17(10):171-172. 被引量:4
  • 2Bell LaPadulaL. Secure computing systems ; mathe-matical foundation and model [R]. MITRE Report, 1973 ,2547(2):1-5.
  • 3Feng N, Wang H J, Li M. A security risk analysismodel for information systems : causal relationships of riskfactors and vulnerability propagation analysis[J]. Informationsciences,2014,256 : 57-73.
  • 4Maconachy W V, Schou C D. A model for informa-tion assurance : an integrated approach[C]. Proceedings of the2001 IEEE Workshop on Information Assurance Security,2001:180-185.
  • 5Lim M J H, Negnevitsky M,Hartnett J. Personal-ity Trait Based Simulation Model of the E-mail System[J],International Journal of Network Security ,2006,3 (2) : 164-182.
  • 6Aral S,Walker D. Identifying influential and sus-ceptible members of social networks[J]. Science, 2012, 337(6092):337-341.
  • 7Domingos P,Richardson M. Mining the networkvalue of customers[C]. Proceedings of the seventh ACMSIGKDD international conference on Knowledge discoveryand data mining, ACM, 2001 : 57-66.
  • 8Goldsmith Pinkham P,Imbens G W. Social net-works and the identification of peer effects [J]. Journal ofBusiness & Economic Statistics,2013,31(3) :253-264.
  • 9Brock W A, Durlauf S N. Discrete choice with so-cial interactions[J]. The Review of Economic Studies, 2001,68(2):235-260.
  • 10Graham B S. Identifying social interactions throughconditional variance restrictions[J]. Econometrica, 2008,76(3):643-660.

二级参考文献5

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部