首页 | 官方网站   微博 | 高级检索  
     

面向主体脆弱性的权限控制安全分析模型
引用本文:黄光球,李艳.面向主体脆弱性的权限控制安全分析模型[J].计算机工程,2010,36(11):148-151.
作者姓名:黄光球  李艳
作者单位:西安建筑科技大学管理学院,西安,710055
摘    要:在网络攻击过程中脆弱性存在于节点的部件主体上,针对该问题,将攻击描述细化到网络部件级,在原权限控制模型中增加对部件间权限、连接关系、属性的描述及脆弱性重写规则,构造NCVTG模型,提出复杂度为多项式时间的NCVTG模型图权限转移闭包生成算法用以评估网络的动态变化,给出当前脆弱性状态下的所有攻击路径。实验结果证明,该模型可对网络安全性进行综合分析,预测所有可能的攻击。

关 键 词:网络安全分析模型  攻击图  权限获取-授予模型  重写规则

Privilege Control Security Analysis Model Oriented to Subject Vulnerability
HUANG Guang-qiu,LI Yan.Privilege Control Security Analysis Model Oriented to Subject Vulnerability[J].Computer Engineering,2010,36(11):148-151.
Authors:HUANG Guang-qiu  LI Yan
Affiliation:(1. School of Computer, Wuyi University, Jiangmen 529020; 2. School of Information Science & Technology, Southwest Jiaotong University, Chengdu 610031; 3. School of Information Engineering, Wuyi University, Jiangmen 529020)
Abstract:A power system transient stability assessment method is proposed based on an information fusion model. When accidents occur, much information obtained from power networks and generators is synthesized to diagnose power system transient stability by the method. D-S evidence theory is fused for further reducing the uncertainty of transient stability assessment. A 10-generator and 39-bus power system is simulated. The simulation result indicates that the proposed method is more precise than the old methods.
Keywords:information fusion  artificial neural network  D-S evidence theory  transient stability assessment  trajectory sensitivity
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号