期刊文献+

云际环境下基于用户行为的软件安全研究

Research on Software Security Based on User Behavior in Cloud Computing
下载PDF
导出
摘要 随着云计算和大数据的高速发展,网络资源越来越丰富,计算机网络开始逐渐渗透到人们生活的各个领域。但是,随之而来的网络和软件安全问题日益严重,严重影响了云计算的发展。本文提出了一种基于用户行为的软件安全模型,通过分析网络流量和本地用户行为数据,实现对异常行为的检测。 With the rapid development of cloud computing and big data,network resources are becoming more and more abundant,and computer networks have gradually penetrated into all areas of people’s life.However,the ensu⁃ing network and software security problems have become more and more serious,which has seriously affected the de⁃velopment of cloud computing.This paper proposes a software security model based on user behavior,which can de⁃tect abnormal behaviors by analyzing network traffic and local user behavior data.
作者 马杰 MA Jie(Henan College of Finance and Monetary,Zhengzhou Henan 451464)
出处 《河南科技》 2021年第8期7-9,共3页 Henan Science and Technology
基金 河南省科技攻关项目“云际环境下基于用户行为的软件安全研究”(192102210288)。
关键词 云计算 软件安全 用户行为 异常检测 cloud computing software security user behavior abnormal detection
  • 相关文献

参考文献5

二级参考文献28

  • 1宋国峰,梁昌勇.一种基于用户行为信任的云安全访问控制模型[J].中国管理科学,2013,21(S2):669-676. 被引量:16
  • 2https://github.com/kbandla/APTnotes .
  • 3McCusker O,Brunza S,Dasgupta D.Deriving behavior primitives from aggregate network features using support vector machines. Proceedings of IEEE 5th International Conference on Cyber Conflict (CyCon) . 2013
  • 4Yen T F,Oprea A,Onarlioglu K,et al.Beehive:large-scale log analysis for detecting suspicious activity in enterprise networks. Proceedings of the 29th Annual Computer Security Applications Conference . 2013
  • 5Hutchins E M,Cloppert M J,Amin R M.Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare&Security Research . 2011
  • 6Bhatt P,Toshiro Yano E,Gustavsson P M.Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks. 2014 IEEE 8 th International Symposium on Service Oriented System Engineering (SOSE) . 2014
  • 7Kim M S,Kang H J,Hong S C etc.A Flow-based Method for Abnormal Network Traffic Detection. IEEE/IFIP Network Operations and Management Symposium . 2004
  • 8P. García-Teodoro,J. Díaz-Verdejo,G. Maciá-Fernández,E. Vázquez.??Anomaly-based network intrusion detection: Techniques, systems and challenges(J)Computers & Security . 2008 (1)
  • 9沈超,蔡忠闽,管晓宏,房超,杜友田.基于鼠标行为特征的用户身份认证与监控[J].通信学报,2010,31(7):68-75. 被引量:16
  • 10郭小芳,李锋,王卫东.基于k-近邻的多元时间序列局部异常检测[J].江苏科技大学学报(自然科学版),2012,26(5):505-508. 被引量:5

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部