首页 | 官方网站   微博 | 高级检索  
     

一种入侵者视野下的复杂网络安全评估方案
引用本文:沈亦军,钟伯成.一种入侵者视野下的复杂网络安全评估方案[J].计算机工程与应用,2015,51(15):119-123.
作者姓名:沈亦军  钟伯成
作者单位:1.合肥学院,合肥 230601 2.上海工程技术大学,上海 201620
摘    要:针对现有复杂网络系统中存在的各种脆弱性评估问题,如脆弱性评估量化不精确、评估误差较大等。这里以邻接矩阵知识为理论基础,结合复杂网络系统的特定环境,设计出一种脆弱性定量评估方法。该方法一方面从单一专业入侵者的层面展开细致深入的探讨,另一方面还引入入侵者选择能力和其选定入侵网络节点的能力大小因素,除此之外,还设计了网络子站的信息结构,对这一个方法的有效性进行验证。验证结果显示该方法对网络系统脆弱性的研究有很大的优势。

关 键 词:复杂网络系统  脆弱性  定量评估  入侵者  

Scheme of complex network safety assessment based on invaders vision
SHEN Yijun,ZHONG Bocheng.Scheme of complex network safety assessment based on invaders vision[J].Computer Engineering and Applications,2015,51(15):119-123.
Authors:SHEN Yijun  ZHONG Bocheng
Affiliation:1.Hefei University, Hefei 230601, China 2.Shanghai University of Engineering Science, Shanghai 201620, China
Abstract:For a variety existing vulnerability assessments problems in the complex network system, such as the inaccurate vulnerability assessment quantization, the large assessment error, etc, this paper designs a quantitative vulnerability assessment method, which takes adjacency matrix knowledge as theoretical basis and combines the complex network systems environment. This method starts detailed in-depth discussion from the level of professional intruder singly on the one hand; on the other hand, it also introduces the intruders’ choosing ability and the size of intruders’ selecting invasion network node ability; in addition, it also designs the information structure of the network sub-station to verify the effectiveness of this method. The validation results indicate that this method of vulnerability research network system has great advantage.
Keywords:complex network system  vulnerability  quantitative assessment  invaders  
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号