期刊文献+

安全等级对信息系统安全技术策略的影响研究——以防火墙和IDS技术组合为例 被引量:5

Study on the influence of security rank on the strategy of information system security technology:Taking the example of firewall and IDS technology portfolio
原文传递
导出
摘要 以防火墙和IDS技术组合为例,利用博弈论研究了信息系统安全等级对该安全技术组合与配置策略的影响,发现安全等级越高对黑客威慑越大,从而可降低黑客入侵率.单一地提高其中一种技术配置并不一定能提高安全等级,只有在两种技术配置相协调时才能提高安全等级,说明安全等级越高对安全技术组合与配置的要求越高.研究还对比了未考虑安全等级和考虑安全等级的均衡策略,认为未考虑安全等级的均衡策略只是考虑安全等级时的一个边界,且这个边界特例在现实中通常无法或无需达到. The influence of security rank on the technology portfolio and configurations of firewall and IDS was researched through game theory by this paper. It shows that the higher the security rank the bigger deterrence to hackers whose intrusion probability would be decreased. The security rank is not always improved when only one of the technology configurations is improved, and it is improved when both of the two technology configurations are coordinated with each other, which illustrates that the higher the security rank the higher requirement of security technology portfolio and configuration. The equilibrium strategy is also compared to the one without considering security rank, and the latter is an extremity of the former, which could not be reached or with no need to get.
出处 《系统工程理论与实践》 EI CSSCI CSCD 北大核心 2016年第5期1231-1238,共8页 Systems Engineering-Theory & Practice
基金 国家自然科学基金(71071033)~~
关键词 信息系统安全 安全等级 技术组合 技术配置 博弈 information system security security rank technology portfolio technology configuration game theory
  • 相关文献

参考文献5

二级参考文献69

  • 1郭渊博,马建峰.基于博弈论框架的自适应网络入侵检测与响应[J].系统工程与电子技术,2005,27(5):914-917. 被引量:9
  • 2王卫平,朱卫未.基于不完全信息动态博弈的入侵检测模型[J].小型微型计算机系统,2006,27(2):253-256. 被引量:4
  • 3徐南荣 仲伟俊.科学决策理论与方法[M].南京:东南大学出版社,1996.2-10. 被引量:21
  • 4Bace R, Mell P. Special Publication on Intrusion Detection System [ R]. Washington D. C. : National Institute of Standards and Technology, NIST SP-800-31, 2001. 被引量:1
  • 5Eugene S. Intrusion prevention [J]. Computers & Security, 2004, 23(4) : 265-266. 被引量:1
  • 6Kim S, Lee J. A system architecture for high-speed deep packet inspection in signature-based network intrusion prevention [J].Journal of Systems Architecture, 2007, 56(5): 1383-7621. 被引量:1
  • 7Morton S. Using the danger model of immune systems for distributed defense in modern data networks [ J ]. Computer Networks, 2007, 51(5): 1315-1333. 被引量:1
  • 8Lye K, Jeannette M W. Game strategies in network security [ J ]. International Journal of Information Security, 2005,4 (2) : 71 -86. 被引量:1
  • 9Tansu A, Tamer B. A game theoretic analysis of intrusion detection in access control system[ A ]. In: Proceedings of 43rd IEEE Conference on Decision and Control [ C ]. Atlantis, Paradise Island: IEEE Control Systems Society, 2004. 1568-1573. 被引量:1
  • 10Huseyin C, Srinivasan R. Configuration of detection software : A comparison of decision and game theory approaches [ J ]. Decision Analysis, 2004, 1 (3) : 131-148. 被引量:1

共引文献43

同被引文献52

引证文献5

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部