全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2018 

基于云模型与贝叶斯反馈的网络安全等级评估方法
Evaluation method for network security level based on cloud model and Bayesian feedback

DOI: 10.6040/j.issn.1671-9352.2.2017.136

Keywords: 云模型,网络安全等级测评,评判模糊性,逆向云算法,贝叶斯反馈,
Bayesian feedback
,network security grade evaluation,cloud model,the fuzziness of judgment,reverse cloud algorithm

Full-Text   Cite this paper   Add to My Lib

Abstract:

摘要: 鉴于测评人员对信息系统等级保护测评中网络安全评估的测评指标理解的局限性、评判的模糊性以及量化打分中判定区间的不确定性,将云模型与贝叶斯反馈算法相结合,采用云模型理论来处理评估结果的模糊性和随机性。由于传统的一维逆向云算法出现超熵为虚数的情况,因此,使用无确定度逆向云算法来避免这种情况的发生。通过建立贝叶斯反馈云模型,对给出的测评结果进行检验和修正,使评估结果更加客观,准确。根据已修正网络安全整体评估云的期望和熵,给出合理的安全等级判定区间,作为实际测评中等级评估的依据。实例验证表明,该评估方法可以有效地修正测评人员评估结果之间的差异,实现合理的判定划分,给出客观、准确的等级评估结果。
Abstract: In view of the limitations of the evaluation staff on the content of the evaluation index and the fuzziness of judgment and the limitation of the judgment interval in quantitative evaluation of network security evaluation in information system level protection. The researchers combine the cloud model with the Bayesian feedback algorithm and adopt the cloud model theory to deal with the fuzziness and randomness of the evaluation results. Because the traditional one-dimensional reverse cloud algorithm appears hyper entropy is imaginary, therefore, researchers use the uncertainty of the reverse cloud algorithm to avoid the occurrence of negative entropy. Through the construction of Bayesian feedback cloud model, which is constructed to test and correct the evaluation results given by experts or reviewers which makes the final evaluation results more objective and accurate. According to the expectation and entropy of the overall correction cloud of network security and the reasonable security grade judgment interval is given as the basis of the grade evaluation in the actual evaluation. Verified by an example, the evaluation method proposed that can effectively correct the difference between the evaluation results of the evaluation personnel, realize the reasonable judgment division and give the objective and accurate grade evaluation result

References

[1]  张焕国,韩文报,来学嘉,等.网络空间安全综述[J].中国科学(信息科学),2016,46(2):125-164. ZHANG Huanguo, HAN Wenbao, LAI Xuejia, et al. Survey on Cyberspace security[J]. Scientia Sincia Informations, 2016, 46(2):125-164.
[2]  XU Yang, XIE Xiaoyao, ZHANG Huanguo. Information security testing model based on variable weights fuzzy comprehensive evaluation[J]. China Communications, 2011, 7:76-82.
[3]  陈昊,李兵,刘常昱.一种无确定的逆向云算法[J].小型微型计算机系统,2015,36(3):544-549. CHEN Hao, LI Bin, LIU Changyu. An algorithm of backward cloud without certainty degree[J]. Journal of Chinese Computer Systems, 2015, 36(3):544-549.
[4]  杨莎. 基于云理论的信任评估模型及应用研究[D]. 保定:华北电力大学,2011. YANG Sha. Research on trust evaluation model and application based on cloud theory[D]. Baoding: North China Electric Power University, 2011.
[5]  王健,肖文杰,王树文,等.一种改进的基于云模型的效能评估方法[J].火力与指挥控制,2010,35(7):139-142. WANG Jian, XIAO Wenjie, WANG Shuwen, et al. An improved effectiveness evaluation method based on cloud model[J]. Fire Control and Command Control, 2010, 35(7):139-142.
[6]  公安部信息安全等级保护评估中心.信息安全等级测评师培训教程[M].北京:电子工业出版社,2010. Information security classification protection evaluation center of Ministry of public security. Information security rating trainer training course[M]. Beijing: Publishing House of Electronics Industry, 2010.
[7]  李雪,赵宁,郑暄.基于云模型的道路交通安全等级评价[J].北京工业大学学报,2015,41(8):1219-1224. LI Xue, ZHAO Ning, ZHENG Xuan. Road traffic safety evaluation based on cloud model[J]. Journal of Beijing University of Technology, 2015, 41(8):1219-1224.
[8]  麻士东,韩亮,龚光红,等.基于云模型的目标威胁等级评估[J].北京航空航天大学学报,2010,36(2):150-153. MA Shidong, HAN Liang, GONG Guanghong, et al. Target threat assessment techology based on cloud model[J]. Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(2):150-153.
[9]  张鹏,谢晓尧.基于云模型的信息系统测评安全结论判定[J].武汉大学学报(理学版),2014,5(60):429-433. ZHANG Peng, XIE Xiaoyao. Determination of safety conclusion in evaluating information system based on cloud model[J]. J Wuhan Univ(Nat Sci Ed), 2014, 5(60):429-433.
[10]  徐洋,谢晓尧.信息安全等级保护测评量化模型[M].武汉:武汉大学出版社,2017:29-48. XU Yang, XIE Xiaoyao. Quantification model of testing and evaluation for classified protection of information sysytem security[M]. Wuhan: Wuhan University Press, 2017:29-48.
[11]  李德毅,刘常昱,杜鹢,等. 不确定性人工智能[J].软件学报,2004,15(11):1583-1594. LI Deyi, LIU Changyu, DU Yi, et al. Artificial intelligence with uncertainty[J]. Journal of Software, 2004, 15(11):1583-1594.
[12]  王利花. 基于云模型的信息安全风险分析方法研究[D].焦作:河南理工大学,2014. WANG Lihua. Study information security risk analysis method based on cloud model[D]. Jiaozuo: Henan Polytechnic University, 2014.
[13]  王夏菁,胡昌振,马锐,等. 二进制程序漏洞挖掘关键技术研究综述[J].信息网络安全,2015(8):1-13. WANG Xiajing, HU Changzhen, MA Rui, et al. A survey of the key technology of binary program vulnerability discovery[J]. Netinfo Security, 2015(8):1-13.
[14]  宋远骏,李德毅,杨孝宗,等.电子产品可靠性的云模型评价方法[J].电子学报,2000,28(12):74-76. SONG Yuanjun, LI Deyi, YANG Xiaozong, et al. Reliability evaluation of electronic products based on cloud models[J]. Acta Electronica Sinica, 2000, 28(12):74-76.
[15]  叶琼,李绍隐,张友华,等.云模型及应用综述[J].计算机工程与设计,2011,32(12):4198-4201. YE Qiong, LI Shaoyin, ZHANG Youhua, et al. Cloud model and application overview[J]. Computer Engineering and Design, 2011, 32(12):4198-4201.
[16]  黄海生,王汝传.基于隶属云理论的主观信任评估模型研究[J].通信学报,2008,29(4):13-19. HUANG Haisheng, WANG Ruchuan. Subjective trust evaluation model based on membership cloud theory[J]. Journal on Communications, 2008, 29(4):13-19.
[17]  李德毅,杜鹢.不确定性人工智能[M].北京:国防工业出版社,2014:50-59. LI Deyi, DU Yi. Artifical intelligence with uncertainty[M]. Beijing: National Defense Industry Press, 2014: 50-59.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133