期刊文献+

基于帕累托优化的网络安全设备部署设计与研究 被引量:2

Design and research of cyber security device deployment based on Pareto optimality
下载PDF
导出
摘要 通过部署网络安全设备可以有效地提高网络的安全性,但由于网络设备种类繁多、功能复杂,如何在整个网络中最优地部署网络安全设备,从而达到安全和开销的平衡,仍是研究人员关注的焦点。将网络安全设备最优部署问题转换为帕累托优化问题,提出分布式约束优化的七元组对网络安全设备部署进行量化赋值,构建基于分支界限算法的部署方案搜索算法,在解空间内对量化的数值进行计算并求出最优解。由于基于分支界限算法的方案搜索算法需要耗费大量时间,在大型网络中运行效率较低,使用基于弧一致优化的数据预处理技术对量化数值进行预处理,实现搜索算法的优化。最后通过仿真实验测试,证明该方法的正确性和有效性。 By deploying cyber security devices,cyber security can be effectively improved. But due to the varieties and complex function of cyber equipment,how to optimize the deployment of cyber security devices is still a core problem for researchers. By turning the deployment of cyber security equipment into a Pareto optimization problem,this paper put forward a tuple,a distributed constraint optimization,to quantify the deployment of cyber security device. Then,based on branch and bound algorithm,it used the algorithm to calculate the quantized values to find out the optimal solution within solution space.And it took a lot of time to run the algorithm,based on branch and bound algorithm,which was infeasible in large networks.This paper proposed to use the data preprocessing technology to optimize the search,which was based on arc consistency technology. This paper computed the quantized value in advance and made the search become an easy problem. Finally,it used the simulation experiments to prove the correctness and effectiveness of the proposed approaches.
作者 冯毅 潘上 李瑞 Feng Yi;Pan Shang;Li Rui(Information Engineering University,Zhengzhou 450000,China)
机构地区 信息工程大学
出处 《计算机应用研究》 CSCD 北大核心 2020年第6期1782-1788,共7页 Application Research of Computers
基金 国家自然科学基金资助项目 信息工程大学科研基金资助项目。
关键词 网络安全设备部署 帕累托优化 分支界限搜索算法 弧一致预处理技术 cyber security device deployment Pareto optimization branch and boundary algorithm arc consistency technology
  • 相关文献

参考文献5

二级参考文献41

  • 1雷德明,吴智铭.Pareto档案多目标粒子群优化[J].模式识别与人工智能,2006,19(4):475-480. 被引量:25
  • 2http://www.gamsworld.org/minlp/solvers.htm#BARON.
  • 3Sahinidis NV. Optimization under Uncertainty: State-of-the-Art and opportunities. Computers and Chemical Engineering, 2004, 28(6):971-983. [doi: 10.1016/j.compchemeng.2003.09.017].
  • 4Wolsey LA. Integer Programming. New York: John Wiley & Sons, 1998.
  • 5http://www.oracle.com/solaris/index.html.
  • 6http://sourceforge.net/projects/bombers60/.
  • 7张晓薇,曹东刚,田刚,陈向群.网络化移动应用的全局适应性数据预取机制.软件学报,2010,21(8):1783-1794.http://www.jos.org.cn/1000-9825/3617.htm [doi: 10.3724/SP.J.1001.2010.03617].
  • 8Perry DE, Wolf AL. Foundations for the study of software architecture. ACM SIGSOFT Software Engineering Notes, 1992,17(4): 40-52. [doi: 10.1145/141874.141884].
  • 9All N, Solis C, Ramos I. Comparing architecture description languages for mobile software systems. In: Proc. of the 1st Int'l Workshop on Software Architectures and Mobility. New York: ACM Press, 2008.33-38. [doi: 10.1145/1370888.1370897].
  • 10Clements P, Kazman R, Klein M. Evaluating Software Architectures: Methods and Case Studies. Addison Wesley, 2001.

共引文献178

同被引文献23

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部