期刊文献+

面向边缘计算的安全态势感知模型 被引量:1

Security Situational Awareness Model for Edge Computing
下载PDF
导出
摘要 边缘计算现在被广泛应用于工业物联网。由于边缘计算设备靠近终端,拥有大量的私人用户信息和丰富的数字资产,因此非常容易受到攻击。鉴于此,提出一种边缘计算设备的态势感知模型,在边缘设备对其自身的状态和数据进行量化,通过状态转移矩阵分析不同时刻下系统的状态是否正常,以此对系统可能遭遇的攻击进行警示和检测,以达到保护边缘设备安全的目的。最后,通过实验验证了所提的态势感知模型能够准确展示边缘设备运行的安全状态情况。 Edge computing is now widely used in industrial IoT.Because edge computing devices are close to terminals,and has a large amount of private user information and rich digital assets,it is very vulnerable to attacks.Therefore,a situational awareness model for edge computing devices is proposed,in which edge devices quantify their own state and data.The state transfer matrix is used to analyze whether the state of the system is normal at different times,so as to alert and detect possible attacks on the system to achieve the purpose of protecting the security of edge devices.Finally,the proposed situational awareness model is verified through experiments to be able to accurately demonstrate the security state situation of edge devices operation.
作者 雷文鑫 侯文静 文红 徐鑫辰 吴思慧 费灵芝 LEI Wenxin;HOU Wenjing;WEN Hong;XU Xinchen;WU Sihui;FEI Lingzhi(University of Electronic Science and Technology,Chengdu Sichuan 611731,China)
机构地区 电子科技大学
出处 《通信技术》 2021年第3期711-715,共5页 Communications Technology
基金 国家重大研发计划(No.2018YFB0904900,No.2018YFB0904905)。
关键词 边缘计算 态势感知 安全状态 复杂网络 edge computing situational awareness security state complex networks
  • 相关文献

参考文献5

二级参考文献35

  • 1潘峰,张电.一个实用、高效网络安全态势感知系统的设计[J].保密科学技术,2012(2):65-69. 被引量:1
  • 2任伟,蒋兴浩,孙锬锋.基于RBF神经网络的网络安全态势预测方法[J].计算机工程与应用,2006,42(31):136-138. 被引量:71
  • 3国务院.国家突发公共事件总体应急预案[M].北京:中国法制出版社,2006.
  • 4国家计算机网络应急技术处理协调中心.2011年中国互联网网络安全态势报告[J].信息网络全,2012,10(4):98-100.
  • 5Srihari R K. Situation awareness through concept-based information extraction [EB/OL]. (2012-05-20), http: //www. dawnbreaker, corn/vas05.
  • 6Zhang S, Yao S, Ye X, et al. A network security situation analysis framework based on information fusion [C]// Proceedings of 6th IEEE Joint International Information Technology and Artificial Intelligence Conference. Chongqing: IEEE Computer Society, 2011 : 362 - 332.
  • 7Stephen L. The spinning cube of potential doom [J]. Communications o f the ACM, 2004, 47(6), 25 - 26.
  • 8Liu Z, Li S, He J, et al. Complex network security analysis based on attack graph model [C]// 2012 Instrumentation, Measurement, Computer, Communication and Control International Conference. Harbin: IEEE Computer Society, 2012: 183-186.
  • 9Wasserkrug S, Etzion O, Gal A. Inference and prediction of uncertain events in active systems: A language and execution model [EB/OL]. (2012-04-25), http: //ftp. informatik. rwthaachen, de/Publications/CEUR-WS.
  • 10Gal A. Managing uncertainty in schema matching with top-k schema mappings [J]. Journal on Data Semantics VI , 2006, 4090: 90- 114.

共引文献583

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部