首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
提出了一种分层的网络安全评价方法,建立了由网络类型、安全定义组成、相关因素构成的层次结构模型,给出了该模型各层次组成的取值和权重的计算公式,分析了各因素的基本因子取值问题,并充分考虑了网络类型对基本因子取值的影响,为网络安全的量化评价奠定了基础.  相似文献   

2.
计算机网络安全综合评价的神经网络模型   总被引:6,自引:0,他引:6  
灰色评价法、模糊综合评价等需确定隶属函数、各指标权重,明显受人为因素的影响。尝试应用神经网络技术进行网络安全的综合评价,并通过在单指标评价标准范围内随机取值方法,生成建立神经网络模型所需的训练样本、检验样本和测试样本,在遵循BP网络建模基本原则和步骤的情况下,建立了可靠、有效的网络安全综合评价模型。16个实例研究表明:提出的样本生成方法、建模过程是可靠的,并能有效地避免出现"过训练"和"过拟合"现象,建立的BP模型具有较好的泛化能力,不受人为因素的影响,各评价指标与网络安全等级之间存在明显的非线性关系,网络安全策略对网络安全的影响最大。  相似文献   

3.
一种新的网络攻击危害度定义方法   总被引:5,自引:1,他引:5  
提出了一种新的危害度评估模型,新模型首次考虑到了网络类型对攻击危害的影响以及影响危害度各因素中存在的动态因素,给出了危害度的定量计算公式,同时分析模型中各因子的取值原则,并用实验对模型进行了验证。  相似文献   

4.
针对现有的网络安全态势预测方法没有从影响网络安全态势的安全因子入手,不能准确地预测未来网络安全态势,提出了一种基于灰色理论和BP神经网络的预测方法。首先依据灰色模型系数的取值大小选择最合适的背景值,并构造了一种新的模型背景值函数。其次,结合GM(1,1)、GM(1,N)模型预测网络安全态势,并用BP神经网络对态势预测值进行修正。最后,通过真实的网络环境验证了所提出的方法在网络安全态势预测中的有效性。  相似文献   

5.
随着高校信息化建设的热潮,网络规模基本覆盖了整个校园。但黑客入侵的增多以及网络病毒的泛滥,给校园网络安全带来了隐患,同时也对校园网络安全的评价提出了更高的要求。本文利用BP神经网络构建评价模型,将其应用于校园网络安全评价当中。参考国内外对校园网络安全评价的研究成果,将评价指标数据量化输入,并通过Matlab仿真实验,训练并得到满意的评价结果,验证了评价模型的适用性。  相似文献   

6.
当前我国网络高度普及,计算机网络成为公众信息交流、各行业工作和生活的核心基础设施,维护计算机网络安全已经成为社会稳定运行的基本需要。而有效维护网络安全必须对网络总体安全风险进行评估,本文则主要分析和识别网络安全的影响因素及类型,分析采用模糊推理方法对网络系统风险进行评价的方法,并从应用角度对该方法的实现和应用效果进行说明,希望能够为网络安全管理提供一定支持。  相似文献   

7.
评价主体、评价对象和评价尺度组合的多样性决定了评价指标体系的不唯一性,本文设计了一种网络安全度量指标体系性能评估的理论方法。结合“熵”、“博弈论”的相关思想,设计了“熵-博弈指标体系优化模型”,通过对指标区分度的计算以及结合指标重要程度因素的修正,对指标体系整体区分度进行测算,比较同一评价对象下不同网络安全度量指标体系的性能差异。通过实例验证了典型网络环境下该理论方法的合理性和可行性。为不同行业、不同业务、不同组成对象甚至同一系统不同时期的网络确定与其相适应的网络安全度量指标体系参考。  相似文献   

8.
共享特性使网络安全评价成为网络运维中最为重要的一部分,因此文章提出了基于模糊数学的网络安全评价模型研究。通过对模型中各层次安全因素特点分析,计算基础安全评判因素,利用处理结果建立单层模糊综合评判。在此基础上,再对评判结果进行高层次模糊综合评价,从而得到网络安全综合评价结果,完成基于模糊数学的网络安全评价模型。通过仿真实验,将其与传统网络安全评价模型攻击性指标对比,分析风险等级分数值情况,从而证明研究有效性。  相似文献   

9.
在信息时代的今天,研究网络安全态势成为了计算机技术研究者关注的焦点。本文研究了网络安全态势评估 体系的原理、组成,结合评估网络安全态势的模型,分析了各部分功能及其关键技术。网络安全态势评估将有利于网络安全威 胁因素的排查,保证整个网络安全有序地运行。  相似文献   

10.
基于模糊层次分析法的计算机网络安全评价   总被引:2,自引:0,他引:2  
根据计算机网络的特点及网络安全涉及的因素,建立计算机网络安全评价的层次结构模型,运用基于三角模糊数的模糊层次分析法实现对网络安全的综合量化评价。实例的计算结果表明模糊层次分析法适用于定性判断的量化综合,它为计算机网络安全评价提供了一种探索性方法。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号