期刊文献+

基于动态信任的接入管控体系构建 被引量:3

The Construction of Access Control System Based on Dynamic Trust
下载PDF
导出
摘要 近年来,伴随着企业的数字化转型快速落地,内部数据泄露和受高级可持续威胁攻击(Advanced Persistent Threat,APT)的风险不断升级,传统的接入管控模式暴露出一系列问题。针对广域网和云计算环境下接入访问的高度动态化特点,设计动态信任度量的接入管控体系,通过信任持续度量实现对接入访问的动态管控,在不断变化的环境下保障用户接入与访问的安全。同时,针对信任度量核心问题,提出了一种基于随机森林的信任度量算法,有效解决模型应用中样本数量不平衡的问题,加快学习收敛。该算法可应用在广域网络和云平台等不同的网络环境。 In recent years, with the rapid implementation of digital transformation of enterprises, the threat of internal data leakage and APT(Advanced Persistent Threat) attacks continue to escalate, and the traditional access control model exposes a series of problems. According to the highly dynamic characteristics of access in WAN and cloud computing environments, an access control system on dynamic trust measurement is designed. Through the continuous measurement of trust, the dynamic control of access is realized, and the security of user access is guaranteed in the changing environment. At the same time, aiming at the core problem of trust measurement, a trust measurement algorithm based on random forest is proposed, which can effectively solve the problem of unbalanced sample number in model application and accelerate the learning convergence. The algorithm can be applied in different network environments such as wide area network and cloud platform.
作者 廖竣锴 程永新 张建辉 LIAO Junkai;CHENG Yongxin;ZHANG Jianhui(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《通信技术》 2022年第4期473-479,共7页 Communications Technology
关键词 持续信任 信任度量 网络接入 随机森林 continuous trust trust measurement network access random forest
  • 相关文献

参考文献9

二级参考文献59

  • 1龙勤,刘鹏,潘爱民.基于角色的扩展可管理访问控制模型研究与实现[J].计算机研究与发展,2005,42(5):868-876. 被引量:26
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 4张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 5R Sandhu,E Coyne, H Feinstein, et al. Role-based access control models[ J]. IEEE Computer, 1996,29(2 ) :38 - 47.
  • 6R Sandhu, V Bhamidipati, Q Munawer. The ARBAC97 model for role-based administration of mles[J]. ACM Transactions on Information and System Security, 1997,2( 1 ) : 105 - 135.
  • 7D F Ferraiolo,R Sandhu,S Gavrila,et al.Proposed NIST standard for role-based access control[J]. ACM Transactions on In- formation and System Security, 2001,4(3) : 224 - 274.
  • 8P H Bammigatti. GenericWA-RBAC: role based access control model for web applications[ A]. Proceedings of the 9th International Conference on Information Technology ( ICIT' 06) [ C ]. Bhubaneswar, India:IEEE Computer Society, 2006.237 - 240.
  • 9L Dong, S Yu, K Ouyang, The dynamic endpoint-based access control model on VPN [ A ]. Proceedings of the International Conference on Networking, Architecture, and Storage ( NAS 2007)[ C]. Guilin, China: IEEE Computer Society, 2007.44 - 54.
  • 10H Takabi,M Amini,R Jalili. Enhancing role-based access control model through fuzzy relations[ A] .Proceedings of the Third International Symposium on Information Assurance and Security [ C]. Manchester, UK: IEEE Computer Society, 2007. 131 - 136.

共引文献136

同被引文献19

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部