期刊文献+

基于模糊集和粗糙集理论的云安全评价模型 被引量:2

Model of Cloud Security Evaluation Based on Rough Set and Fuzzy Set Theory
下载PDF
导出
摘要 研究对云安全的综合评价模型,提高云计算中的网格计算并行处理和防病毒攻击能力。传统的云安全评价模型采用多层模糊集自适应算法,评价系统单一,抗病毒攻击能力较差。提出一种基于模糊集和粗糙集理论的云安全评价模型,构建云安全数据信息网格计算系统,进行安全动态数据流分析,采用基于模糊集和粗糙集理论的评价模型,构建有格点链重叠检测和向量化运算算法,检测病毒入侵信号。仿真结果表明,该云安全综合评价模型执行效率较高,对病毒入侵的检测能力提高,安全检测的成功率比传统方法提高34%,该模型有较好的安全综合评价和攻击入侵检测性能。在云计算系统安全构架中具有较好的应用价值。 The comprehensive evaluation of the cloud security research model, improve the calculation of parallel process-ing and anti-virus attack ability of cloud computing in grid. Cloud security evaluation model using the traditional multilay-er fuzzy set adaptive algorithm, evaluation system is single, antiviral attack ability is bad. Presents a kind of fuzzy set and rough set safety evaluation model based on cloud theory, cloud security data information construction of grid computing sys-tem, security of dynamic data flow analysis, using fuzzy set theory and rough set based on the evaluation model, build a lat-tice chain overlap detection and vectorization algorithm, detection of virus intrusion signal. Simulation results show that the higher efficiency of the execution of the cloud security comprehensive evaluation model, improve the ability of detecting vi-rus invasion, safety detection and improve the success rate of 34%compared with the traditional method, the comprehen-sive evaluation model for better safety and attack intrusion detection performance. In the cloud computing has good value of application system security framework.
出处 《科技通报》 北大核心 2015年第10期115-117,共3页 Bulletin of Science and Technology
基金 海南省自然科学基金资助(614247) 中央高校基本科研业务费资助(3142014069)
关键词 模糊集 粗糙集理论 云安全 fuzzy sets rough set theory Cloud Security
  • 相关文献

参考文献6

  • 1梁力.一种网络多次变异信息入侵检测算法[J].科技通报,2012,28(10):55-57. 被引量:19
  • 2周华,周海军,马建锋.基于博弈论的入侵容忍系统安全性分析模型[J].电子与信息学报,2013,35(8):1933-1939. 被引量:18
  • 3ZHOU Y,JIANG X.Dissecting android malware: Character.ization and evolution[C]//IEEE Symposium on Security andPrivacy.Oakland:IEEE.2012:95-109.
  • 4ENCK W,OCTEAU D,MCDANIEL P,et al.A study of an.droid application security[C]//Proceedings of the 20th USE.NIX security symposium. San Francisco, CA : USE.NIX.2011:64-76.
  • 5FELTA P, FINIFTER M,CHIN E,et al. A survey of mobilemalware in the wild[C]//Proceedings of the 1st ACM work.shop on Security and privacy in smartphones and mobiledevices.Chicago,IL:ACM, 2011: 3-14.
  • 6LAPOLLA M,MARTINELLI F,SGANDURRA D.A surveyon security for mobile devices[J]. Communications Surveys& Tutorials, IEEE. 2012, 15(1):108-117.

二级参考文献10

共引文献31

同被引文献21

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部