期刊文献+

基于STRIDE-LM的5G网络安全威胁建模研究与应用 被引量:4

Research and Application of 5G Cybersecurity Threat Modeling Based on STRIDE-LM
下载PDF
导出
摘要 5G作为"网络的网络",成为万物互联的纽带和融合创新的驱动力,利用面向服务的架构和开放的服务能力,为多类型用户提供全方位的优质服务。5G 网络特点和业务属性决定了其安全的重要性,而网络安全威胁建模是面对复杂网络进行网络安全最佳实践的起点和重要的一环。文章首先介绍业界成熟的威胁建模方法;然后介绍威胁建模方法论的6大阶段;最后重点阐述5G威胁建模的过程和关键输出结果的样例。 As a"network of networks",5G has become the link of the IoT and the driving force for integration and innovation.It uses service-based architecture and open service capabilities to provide a full range of quality services for various types of users and industries.5G network characteristics and business attributes determine the importance of its security.Threat modeling is the starting point and very important part of cyber security best practices in the face of complex cyberspace.This article first introduces the industry's mature threat modeling methods,then introduces the six major stages of the threat modeling methodology,and finally focuses on the 5G threat modeling process and examples of key output results.
作者 毕亲波 赵呈东 BI Qinbo;ZHAO Chengdong(Beijing Venustech Information Security Technology Co.LTD,Beijing 100093,China)
出处 《信息网络安全》 CSCD 北大核心 2020年第9期72-76,共5页 Netinfo Security
关键词 5G 网络安全威胁 威胁建模 业务数据流 攻击面 5G cybersecurity threat threat modeling data flow attack surface
  • 相关文献

参考文献1

二级参考文献24

  • 1ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258.
  • 2TIAN J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits Systems Video Technology, 2003, 13(8): 890-896.
  • 3DRAGOI L and COLTUC D. Local-prediction-based difference expansion reversible watermarking[J]. IEEETransactions on Image Processing, 2014, 23(4): 1779-1790.
  • 4CACIULA I a:ld COLTUC D. Improved control for low bit-rate reversible watermarking[C]. IEEE International Conference on Acoustics Speech and Signal Processing, Florence, Italy, 2014: 7425-7429.
  • 5ZHANG W, HU X, LI X, et al. Recursive histograzn modification: establishing equivalency between reversible data hiding and lossless data compression[J]. IEEE Transactions on Image Processing, 2013, 2(7): 2775-2785.
  • 6JARALI A and RAO J. Unique LSB compression data hiding method[J]. International Journal of Emerging Science and Engineering, 2013, 2(3): 17-21.
  • 7LIAN S, LIU Z, REN Z, et al. Commutative encryption and watermarking in video compression[J]. IEEE Transactions on Circuits and Systems Video Technology, 2007, 17(6): 774-778.
  • 8CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing: Image Communication, 2011, 26(1): 1-12.
  • 9KURIBAYASHI M and TANAKA H. Fingerprinting protocol for images based on additive homomorphic property[J]. IEEE Transactions on Image Processing, 2005, 14(12): 2129-2139.
  • 10MEMON N and WONG P W. A buyer-seller watermarking protocol[J]. IEEE Transactions on Image Processing, 2001, 10(4): 643-649.

共引文献21

同被引文献32

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部