期刊文献+

基于信息熵的网络安全研究 被引量:2

Research on Network Security Based on Information Entropy
下载PDF
导出
摘要 本文针对中国2011年到2015年的月度安全数据展开研究,研究发现飞客蠕虫、仿冒域名和高危漏洞与网络安全事件数量显著相关。通过信息熵和互信息的度量,僵尸病毒的熵值经历了先升的过程,在2014年发生了明显的下降,飞客蠕虫处于下降状态,高危漏洞则在2015年出现了激增的情况,成为重要的安全隐患。安全处理事件数量与僵尸病毒、飞客蠕虫、高危漏洞的熵值在2015年出现了较大的变化,网络安全系统的混乱程度在剧增。通过互信息可以发现2015年我国网络安全出现了新的变化趋势,除了关注传统的僵尸病毒、飞客蠕虫和高危漏洞之外,还需要更加关注后门植入网站和网站被篡改等情况。 This paper makes a research based on the monthly security data of China from 2011 to 2015, finding that Conficker, piracy domain name and high - risk vulnerability were apparently related to the number of network security events. According to the measurement of information entropy and mutual information, the entropy value of Zombie virus rose at first and then declined obviously in 2014, Conficker was on the declining status while high - risk vulnerability increased dramatically in 2015, which became the major security loophole. The number of security disposal events and the entropy value of zombie virus, Conficker and high -risk vulnerability changed greatly in 2015 and the network security system was becoming increasingly chaotic. It can be found that our network security witnessed a new changing trend in 2015 through mutual information: in addition to traditional zombie virus, Conficker and high - risk vulnerabilities ,we should pay more attention to backdoor implantation websites and website defacement.
出处 《学术探索》 CSSCI 北大核心 2016年第9期66-72,共7页 Academic Exploration
关键词 网络安全 信息熵 互信息 network security information entropy mutual information
  • 相关文献

参考文献10

二级参考文献75

  • 1任伟,蒋兴浩,孙锬锋.基于RBF神经网络的网络安全态势预测方法[J].计算机工程与应用,2006,42(31):136-138. 被引量:71
  • 2中华人民共和国计算机信息系统安全保护条例(国务院令第147号)[EB/OL].1994[2009-12-10].http://baike.baidu.com/view/99664htm?fr=a1a0.
  • 3国家信息化领导小组关于加强信息安全保障工作的意见(中办发[2003]27号)[EB/OL].2003[2009-12-10].http://www.docin.com/p-29297294.html.
  • 4.中共中央关于加强党的执政能力建设的决定[EB/OL].http://www.china.org.cn/ chinese/.2004/Sep/668376.htm,2004-09-25.
  • 5The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation-Part 1:Introduction and General Model, ISO/IEC 15408-1:1999(E)[S]. 1999.
  • 6The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation-Part 2:Security Function Requirements, ISO/IEC 15408-2:1999(E)[S]. 1999.
  • 7The International Organization for Standardization, Common Criteria for Information Technology Security Evaluation-Part 3:Security Assurance Requirements, ISO/IEC 15408-3: 1999(E)[S]. 1999.
  • 8BRESLAU L, ESTRIN D, FALL K. Advances in network simulation[J]. IEEE Computer, 2000, 35(5): 59-67.
  • 9候定丕,王战军.非线性评估的理论探索与应用[M]合肥:中国科学技术大学出版社,2001.
  • 10Canada. Communications Security Establishment, Canadian Trusted Computer Product Evaluation Criteria (V3.0e) [S]. 1993.

共引文献440

同被引文献25

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部