期刊文献+

信息安全管理机制设计

Design on Information Security Management Mechanism
下载PDF
导出
摘要 如何抑制攻击者对系统的攻击,是从根本上消除信息安全风险发生的关键。由于攻击者和防御者的效用函数不同,单独依靠技术手段并不能完全有效地控制和实现信息安全。而攻击者和防御者之间的风险控制问题其实就是将防御者作为委托人、攻击者作为代理人的委托代理问题,所以必须根据防御者具体的防御措施设计相应的防御机制,使攻击者在此机制下放弃或无法进行正常的进攻计划,从而达到从根本上消除信息安全风险发生的目的。 How to suppress the attacker's attack on the system is the key to fundamentally eliminate the risk of information security. Due to the different utility functions of the attacker and the defender, the technical means alone could not effectively control and realize the information security. The risk-control problem of between the attacker and the defender is actually the defender as the principal, the attacker as the agent of principal-agent problem. Therefore, the defense mechanism must be designed in accordance with the defenders' specific defense measures. Under this mechanism, the attacker would give up or fail to carry out a normal attack plan, thus to achieve the goal of eliminating infosec risk from the root.
作者 韩文英 李娟
出处 《通信技术》 2018年第2期425-428,共4页 Communications Technology
关键词 信息安全 博弈 防御 机制设计 information security game defense mechanism design
  • 相关文献

参考文献2

二级参考文献45

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3冯萍慧,连一峰,戴英侠,李闻,张颖君.面向网络系统的脆弱性利用成本估算模型[J].计算机学报,2006,29(8):1375-1382. 被引量:28
  • 4张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 5Nicol D M, Liljenstam M. Models and analysis of active worm defense//Lecture Notes in Computer Science, 2005, 3685:38-53
  • 6Nash John. Equilibrium points in n-person games. Proceedings of the National Academy of Sciences, 1950, (36) : 48-49
  • 7Hamilton S N, Miller W L, Ott A, Saydjari O S. The role of game theory in information warfare//Proceedings of the 4th Information Survivability Workshop. Vancouver, Canada, 2002 : 45-46
  • 8Schneier B. Attack trees. Dr. Dobb' s Journal, 1999, 24 (12) : 21-29
  • 9Moore Andrew P, Ellison Robert J, Linger Richard C. Attack modeling for information security and survivability. Technical Note: CMU/SEI-2001-TN-001, 2001
  • 10Dacier M. Towards quantitative evaluation of computer security. Institut National Polytechnique de Toulouse, 1994

共引文献159

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部