期刊文献+

国家电网边缘计算应用安全风险评估研究 被引量:18

Application security risk assessment of state grid edge computing
下载PDF
导出
摘要 依据国家网络安全等级保护与风险评估系列标准以及电力信息系统特点,提出国家电网边缘计算应用安全的风险评估模型,然后采用漏洞扫描工具AWVS、AppScan分别对集成最新安全漏洞的开源Web应用靶机软件BWAPP进行安全漏洞评测与风险评估实验,再运用模糊层次分析法对Web应用安全进行综合安全评价。针对应用程序的安全检测实验结果整理安全评估数据,实现对国家电网边缘计算应用安全风险评估的实例化验证。 According to a series of the national cyber security level protection and risk assessment standards and the characteristics of electric power information systems,a risk assessment model for application security of state grid edge computing is proposed.Then,the vulnerability scanning tools AWVS and AppScan are used to target security vulnerability evaluation and risk assessment experiments on the open source web application target software BWAPP that integrates the latest security vulnerabilities.Finally,the fuzzy analytic hierarchy method is used to comprehensively evaluate the security of Web application security.Based on the test results of the application security,the security assessment data are compiled to realize the verification of the application security risk assessment of the state grid edge computing.
作者 郭昊 何小芸 孙学洁 陈红松 刘周斌 颉靖 GUO Hao;HE Xiao-yun;SUN Xue-jie;CHEN Hong-song;LIU Zhou-bin;XIE Jing(Global Energy Interconnection Research Institute Co.,Ltd.,Beijing 102209;State Grid Key Laboratory of Information&Network Security,Beijing 102209;School of Computer and Communication Engineering,University of Science and Technology Beijing,Beijing 100083;State Grid Zhejiang Province Electric Power Research Institute,Hangzhou 310014;Defense Electronics Institute,China Industrial Control System Cyber Emergency Response Team,Beijing 100040,China)
出处 《计算机工程与科学》 CSCD 北大核心 2020年第9期1563-1571,共9页 Computer Engineering & Science
基金 国家社会科学基金(18BGJ071)。
关键词 边缘计算 应用安全 风险评估 edge computing application security risk assessment
  • 相关文献

参考文献10

二级参考文献73

  • 1蔡昱,张玉清,冯登国.基于GB17859-1999标准体系的风险评估方法[J].计算机工程与应用,2005,41(12):134-137. 被引量:4
  • 2许诚,张玉清,雷震甲.企业信息安全风险的自评估及其流程设计[J].计算机应用研究,2005,22(7):108-110. 被引量:14
  • 3赵冬梅,刘海峰,刘晨光.基于BP神经网络的信息安全风险评估[J].计算机工程与应用,2007,43(1):139-141. 被引量:56
  • 4国家质量技术监督局.GBl7859-1999计算机信息系统安全保护等级划分准则[S].1999.
  • 5Wikipedia org.Cross-site Scripting[EB/OL].[2011-10-16].http://en.wikipedia.org/wiki/Cross-site_scripting,2011.
  • 6雷航.漏洞检测与风险评估技术研究[D].成都:成都电子科技大学电子技术学院,2005.
  • 7LANEY D. 3D Data Management:Controlling Data Volume,Velocity,and Variety [J]. Application Delivery Strategies, 2001 ,( 6 ): 70-72.
  • 8QuerylO. Hadoop-based SQL & Big Data Analytics Solution[EB/OL]. http://queryio.com,2015-06-12.
  • 9IBM.智慧的城市:理解IBM智慧城市的基础[EB/OL].http://www-31.ibm.com/province/cn/smartercity.2015-06-13.
  • 10Howe D,Costanzo M,Fey P,et al.Big Data:The Furture of Biocuration[J].Nature,2008,455 ( 7209 ) : 47-50.

共引文献683

同被引文献227

引证文献18

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部