期刊文献+

基于态势感知的等级保护监管技术研究 被引量:1

Research on classified protection monitoring technology based on situational awareness
下载PDF
导出
摘要 文章针对各级网络安全或行业网络安全监管部门开展等级保护监管工作的业务现状和存在的困难进行深入研究,在当前监管工作流程的基础上,提出了利用态势感知技术和其掌握的各监管单位安全建设情况进行框架设计并细化功能,构建具备动态监测和监管展示的系统。为等级保护的监督管理工作提供可靠的数据情报和高效的管理手段。 This paper makes an in-depth study on the current status and difficulties of the network security supervision departments at all levels and industries to carry out the classified protection supervision work. Based on the current supervision workflow, it proposes the use of situational awareness technology and the safety construction of various supervisory units to design the framework and refine features, and a system with dynamic monitoring and regulatory display is constructed. Provide reliable data intelligence and efficient management tools for the supervision and management of classified protection.
作者 王大为 Wang Dawei(Nanjing Dunfei Software Technology Co.,Ltd.,Nanjing 210000,China)
出处 《无线互联科技》 2019年第19期144-146,共3页 Wireless Internet Technology
关键词 等级保护 态势感知 动态监测 数据情报 classified protection situational awareness dynamic monitoring data intelligence
  • 相关文献

参考文献3

二级参考文献43

  • 1刘超,谢宝陵,祝伟玲,徐国明,刘万立.基于数据融合模型的网络安全分析评估系统[J].计算机工程,2005,31(13):140-141. 被引量:7
  • 2Theureau J.Use of nuclear-reactor control room simulators inresearch & development.In:7th IFAC/IFIP/IFORS/IEA Symposium on Analysis,Design and Evaluation of MAN-MACHINE SYSTEMS,Kyoto.1998.425~430 被引量:1
  • 3Endsley M R.Design and evaluation for situation awareness enhancement.Paper presented at the Human Factors Society 32nd Annual Meeting.Santa Monica,CA,1988 被引量:1
  • 4Bass T,Gruber D.A glimpse into the future of id.http://www.usenix.org/publications /login/1999-9/features/future.html,1999 被引量:1
  • 5Bass T.Intrusion Detection Systems and Multisensor Data Fusion:Creating Cyberspace Situational Awareness.Communications of the ACM,2000,43(4):99~105 被引量:1
  • 6Batsell S G,Rao N S,Shankar M.Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security.http://www.ioc.ornl.gov/projects/documents/containment.pdf,2005 被引量:1
  • 7Shifflet J.A Technique Independent Fusion Model For Network Intrusion Detection.Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics,2005,3(1):13~19 被引量:1
  • 8DeMontigny-Leboeuf A,Massicotte F.Passive network discovery for real time situation awareness.NATO/RTO Adaptive Defence in Unclassified Networks,Toulouse,France,April 2004 被引量:1
  • 9Yurcik W,et al.Two visual computer network security monitoring tools incorporating operator interface requirements.ACM CHI Workshop on Human-Computer Interaction and Security Systems(HCISEC),2003 被引量:1
  • 10Lau S.The spinning cube of potential doom.Communications of the ACM,2004,47(6):25~26 被引量:1

共引文献127

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部