首页 | 本学科首页   官方微博 | 高级检索  
     

一种信息系统对抗过程模型的建立
引用本文:罗森林,潘丽敏.一种信息系统对抗过程模型的建立[J].通信学报,2004,25(7):121-127.
作者姓名:罗森林  潘丽敏
作者单位:北京理工大学,信息科学技术学院电子工程系信息对抗技术教研室,北京,100081
摘    要:通过对信息系统攻击和防御行为过程的分析,提出了信息系统攻击与防御的“共道”与“逆道”过程,建立了信息系统对抗过程的“共道-逆道”模型,该模型是信息系统攻击与对抗过程的抽象,通过合理裁剪和填充具体内容便可广泛适用;该模型可以方便地分析攻击方和被攻击方的行为过程,分析其时间区域分布、其“共道”和“逆道”的信息特征等;该模型将为信息系统安全与对抗的系统层的分析、设计和评价提供一定的理论与技术基础。

关 键 词:信息安全  攻击与防御  信息对抗
文章编号:1000-436X(2004)07-0121-07
修稿时间:2004年2月10日

The establishment of one kind of countermeasure processing model of information system
LUO Sen-lin,PAN Li-min.The establishment of one kind of countermeasure processing model of information system[J].Journal on Communications,2004,25(7):121-127.
Authors:LUO Sen-lin  PAN Li-min
Abstract:The networks attack act and the anti-attack act of the two side are analyzed, and the share Tao and inverse Tao processing is discussed; a share Tao--inverse Tao system model is founded in this paper. The model can be applied generally by reasonable modifying and fill concrete contents. The characters of the attack act and the anti-attack act can be analyzed and described by this model. In total, the model is the abstract express of the attack and anti-attack act of information system, it can guide the research and design work of the information security and countermeasure, and provide some kinds of foundation of the analysis and evaluation of the information systems security and countermeasure from the system theory level.
Keywords:information security  attack and defense  information confront
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号