期刊文献+

基于图论的网络安全分析方法研究与应用 被引量:19

A Network Security Analysis Method Research and Application Based on Graph Theory
下载PDF
导出
摘要 当前 ,对网络的安全状况进行定量分析和预警日益显得重要 ,文中通过对漏洞库中的大量漏洞信息进行分析 ,提出对网络安全脆弱性的威胁程度进行定量分析的层次分析模型和指标体系 ,采用图论的方法对各种安全脆弱性信息进行关联分析 ,并在此基础上构造入侵关系图模型 ,给出基于入侵关系图的网络安全威胁分析方法 。 at present it is becoming more important to analyze network security state quantitatively and alarm in advance, the paper analyzes a lot of vulnerabilities' characteristics and proposes a analytic hierarchy process model and a series of indexes, it applies a graph theory method to analyze the association problem among vulnerabilities and construct intrusion relation graph model, the paper also proposes several computing methods of network security state, at the end of the paper analyzes the implementation prototype of the whole network security analysis and evaluation system.
出处 《小型微型计算机系统》 CSCD 北大核心 2003年第10期1865-1869,共5页 Journal of Chinese Computer Systems
基金 国防预研基金 (2 0 0 10 9)资助
关键词 安全评估 层次分析法 图论 安全状况 网络安全 security evaluation analytic hierarchy process graph theory security state
  • 相关文献

参考文献9

  • 1Lowe G, Roscoe B. Using CSP to detect errors in the TMN protocol)[J]. IEEE Transactions on Software Engineering, 1997, 23(10), 659 -669.
  • 2Robert Thorhuus. Software fault injection testing [J]. Ericsson Telecom, Stockholm, Sweden, 2000,2.
  • 3John D Howard. An analysis of security incident on the internet[D]. Carnegie Mellon University, West Lafayette , USA, 1997.
  • 4Rodolphe Ortalo, Yves Deswarte, Mohamed Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security [R]. LAAS Report 96369, 1997,1.
  • 5Mare Daeier, Yves Deswarte, Mohamed Kaaniehe. Quantitative assessment of operational security: models and tools[R]. LAAS Research Report 96493, 1996, 5.
  • 6Steve Miksell, Scott Nainis W, Henry M James. Security vulnerability assessment tools for internet applications[Z]. White Paper, Information Technology Support Center, 2001,3.
  • 7John D McLean. Security model [J]. Encyclopedia of Software Engineering[M] ,Wiley & Sons. Inc , 1994.
  • 8Saaty T L . How to make a decision:the analytic hierarchy process [J]. European Journal of Operational Research, 1990, 1(48) : 9- 26.
  • 9Shafer G &Logan R. Implementing dempster's rule for hierarchical evidence[J]. Artificial Intelligence, i987,33:271-298.

同被引文献101

引证文献19

二级引证文献85

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部