期刊文献+

网络信息系统的可生存性评估研究 被引量:3

Research on evaluating survivability of network information systems
下载PDF
导出
摘要 为有效评估网络信息系统(NIS)的可生存性,将联合分析法和层次分析法有机结合,提出一种综合评价方法。借鉴网络安全等级的思想,对NIS不同方面重要性进行分级,获取用户期望产品和目标的价值和优先权,解决评估NIS的可生存性问题。通过在两个层次上对NIS进行测量:一是调查NIS关于组织策略目标的各方面的全局性能;二是专门调查NIS可生存性的性能,即在受到攻击时如何维持自身的性能。实验结果表明该方法有效,并易于推广应用。利用该方法调查与可生存性相关的性能,帮助NIS管理者在安全与耗费之间做出权衡,以保证NIS可生存性的最佳安全等级。 In order to evaluate the survivability of network information systems,an overall method for assessing is presented based on the integrity of conjoint analysis and AHP.The idea of network security levels is used for reference.Different aspects of NIS are graded into vary levels.With the value and priority,the problem of evaluating NIS survivability is solved.The assessment of NIS is constructed on two levels.One focuses on the investigation about the global performance,another is specialized on the performance of survivability.The experiment results show that the method is valid and is applied easily.Based on the investigation of the performance of NIS survivability,this helps NIS managers make tradeoffs between security and cost.The best security level of NIS survivability is guaranteed.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第14期18-21,共4页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)No.2007AA01Z432 No.2007AA01Z433~~
关键词 网络信息系统 可生存性 联合分析 层次分析法 Network Information System(NIS) survivability conjoint analysis Analytic Hierarchy Process(AHP)
  • 相关文献

参考文献10

  • 1Mead N R,Ellison R J,Linger R C.Survivable network analysis method[EB/OL].( 2000).http ://www.cert.org/archive/pdf/00tr013.pdf. 被引量:1
  • 2Mead N,Lipson H,Sledge C.Towards survivable COTS-based systems[J].Cutter IT Journal,2001,14(2) :4-11. 被引量:1
  • 3McDermott J.Attack-potential-based survivability modeling for high- consequence systems[C]//Third IEEE International Workshop on Information Assurance ( IWIA'05 ), College Park, Maryland, March 23-24,2005 : 119-130. 被引量:1
  • 4Lin Xue-gang,Xu Rong-sheng,Zhu Miao-liang.Survivability analysis for information systems[C]//the 7th International Conference on Advanced Communication Technology (ICACT2005), Phoenix Park, South Korea, February 21-23,2005 : 255-260. 被引量:1
  • 5林雪纲,许榕生.信息系统生存性分析模型研究[J].通信学报,2006,27(2):153-159. 被引量:11
  • 6林雪纲,许榕生,熊华,朱淼良.一种信息系统生存性的量化分析框架[J].电子与信息学报,2006,28(9):1721-1726. 被引量:17
  • 7Jha S,Wing J M.Survivability analysis of networked systems[C]//Proceedings of the 23rd International Conference on Software Engineering(ICSE'01 ), Toronto, Canada, 2001 : 307-317. 被引量:1
  • 8Mcdermott J.Attack-potential-based survivability modeling for high-consequence systems[C]//Proceedings of the 3rd IEEE International Workshop on Information Assurance(IWIA'O5),College Park,Maryland, 2005 : 119-130. 被引量:1
  • 9Jha S K,Wing J M,Linger R C,et al.Survivability analysis of network specifications[C]//Proceedings of Workshop on Dependability Despite Malicious Faults,2000 International Conference on Dependable Systems and Networks(DSN 2000).New York,USA:IEEE Computer Society, 2000: 613-622. 被引量:1
  • 10Harrison W S,Krings A W,Hanebutte.On the performance of a survivability architecture for networked computing systems[C]//the 35th Hawaii International Conference on System Sciences.Hawaii: IEEE Computer Society Press,2002. 被引量:1

二级参考文献26

  • 1包秀国,胡铭曾,张宏莉,张绍瑞.两种网络安全管理系统的生存性定量分析方法[J].通信学报,2004,25(9):34-41. 被引量:27
  • 2HEVNER A,LINGER R.The flow-service-quality framework:unified engineering for large-scale,adaptive systems[A].Proceedings of the 35th Hawaii International Conference on System Sciences[C].Hawaii,USA,2002.278. 被引量:1
  • 3MCDERMOTT J.Attack-potential-based survivability modeling for high-consequence systems[A].Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA'05)[C].College Park,Maryland,2005.119-130. 被引量:1
  • 4JHA S,WING J M.Survivability analysis of networked systems[A].Proceedings of the 23rd International Conference on Software Engineering (ICSE'01)[C].Toronto,Canada,2001.307-317. 被引量:1
  • 5LIN X G,XU R S,ZHU M L.Survivability analysis for information systems[A].Proceedings of the 7th International Conference on Advanced Communication Technology (ICACT2005)[C].Phoenix Park,South Korea,2005.255-260. 被引量:1
  • 6林雪纲,钱桂琼,孙巍等.一种分布式信息系统生存性分析管理平台[A].中国信息协会信息安全专业委员会2004年年会论文集[C].湖南,张家界,2004.163-170. 被引量:1
  • 7ELLISON R J,FISHER D A,LINGER R C,et al.Survivable Network System:An Emerging Discipline[R].Technical Report,CMU/SEI-97-TR-013,Carnegie Mellon University,1997. 被引量:1
  • 8MOITRA S D,KONDA S L.A Simulation Model for Managing Survivability of Networked Information Systems[R].Technical Report CMU/SEI-2000-TR-020,2000. 被引量:1
  • 9LOUCA S,PITSILLIDES A,SAMARAS G.On network survivability algorithms based on trellis graph transformations[A].Proceedings of the Fourth IEEE Symposium on Computers and Communications[C].Red Sea,Egypt,1999.235-243. 被引量:1
  • 10JHA S K,WING J M,LINGER R C,et al.Survivability analysis of network specifications[A].Proceedings of Workshop on Dependability Despite Malicious Faults,2000 International Conference on Dependable Systems and Networks (DSN 2000)[C].New York,USA:IEEE Computer Society,2000.613-622. 被引量:1

共引文献24

同被引文献12

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部