基于交換機配置行為的網(wǎng)絡可信性評估
發(fā)布時間:2019-01-28 09:37
【摘要】:隨著Internet的發(fā)展,網(wǎng)絡呈現(xiàn)復雜、異構(gòu)、多樣等特點,使網(wǎng)絡的安全問題變得越來越突出,目前,網(wǎng)絡的不可信給網(wǎng)絡的安全提出了新的挑戰(zhàn)?尚啪W(wǎng)絡包括服務提供者、終端用戶以及網(wǎng)絡本身的可信內(nèi)涵,隨著局域網(wǎng)的廣泛應用,網(wǎng)絡交換機成為實現(xiàn)網(wǎng)絡數(shù)據(jù)轉(zhuǎn)發(fā)的關鍵設備,由于網(wǎng)絡交換機需要管理員的配置才能實現(xiàn)相應的功能,,而不同的功能會使網(wǎng)絡提供數(shù)據(jù)轉(zhuǎn)發(fā)的性能、有效性、可靠性等受到影響,所以由于不正確的配置或者惡意修改配置內(nèi)容都會使網(wǎng)絡改變其運行方式,導致網(wǎng)絡不能按照預期的方式工作,而使網(wǎng)絡變得不可信。本文基于以上的網(wǎng)絡不可信問題,提出了一種由交換機組成的網(wǎng)絡的可信性評估方法。 基于對網(wǎng)絡信息傳輸?shù)目尚艈栴}的研究,本文研究了交換機的功能原理,并研究了網(wǎng)絡交換機功能與配置命令間的關系,在此基礎上了分析網(wǎng)絡交換機的特性及其行為狀態(tài),由此確定了網(wǎng)絡交換機的配置和網(wǎng)絡狀態(tài)的描述方式,提出了一種由網(wǎng)絡交換機組成的網(wǎng)絡的可信性評估框架,該框架以網(wǎng)絡交換機的配置內(nèi)容為數(shù)據(jù)來源,經(jīng)過數(shù)據(jù)處理獲得反映網(wǎng)絡功能的網(wǎng)絡狀態(tài),并通過網(wǎng)絡的可信預期來評估網(wǎng)絡狀態(tài)的可信程度,進一步通過網(wǎng)絡狀態(tài)與配置行為間的轉(zhuǎn)化關系評估配置行為的可信性,從而實現(xiàn)對網(wǎng)絡的可信性評估。本文將可信網(wǎng)絡的內(nèi)容擴展到可信網(wǎng)絡的設備上,以保證用戶對網(wǎng)絡設備自身運行的可信性要求。
[Abstract]:With the development of the Internet, the network has the characteristics of complex, heterogeneous, diverse and so on, so that the security problem of the network becomes more and more prominent. At present, the untrustworthy network of the network poses a new challenge to the security of the network. the trusted network comprises a service provider, an end user and a trusted connotation of the network itself, and with the wide application of the local area network, the network switch becomes the key equipment for realizing the network data forwarding, different functions may affect the performance, validity, reliability, etc. of the data forwarding of the network, so that the network can not work in the expected manner due to improper configuration or malicious modification of the configuration content, and the network becomes untrustworthy. In this paper, based on the above-mentioned network non-trust problem, a method for evaluating the reliability of a network composed of switches is proposed. Based on the research of the reliability of network information transmission, this paper studies the function principle of the switch, and studies the relation between the function of the network switch and the configuration order, and then analyzes the characteristics and the behavior of the network switch. state, thus the configuration of the network switch and the description mode of the network state are determined, a credibility evaluation framework of a network composed of a network switch is provided, the framework takes the configuration content of the network switch as a data source, and the network shape reflecting the network function is obtained through the data processing The state of the network is evaluated by the trusted expectation of the network, and the credibility of the configuration behavior is further evaluated by the transformation relation between the network state and the configuration behavior, so that the credibility evaluation of the network is realized. In this paper, the content of the trusted network is extended to the equipment of the trusted network, so as to ensure the user's credibility to the network equipment itself.
【學位授予單位】:北京工業(yè)大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP393.08
本文編號:2416941
[Abstract]:With the development of the Internet, the network has the characteristics of complex, heterogeneous, diverse and so on, so that the security problem of the network becomes more and more prominent. At present, the untrustworthy network of the network poses a new challenge to the security of the network. the trusted network comprises a service provider, an end user and a trusted connotation of the network itself, and with the wide application of the local area network, the network switch becomes the key equipment for realizing the network data forwarding, different functions may affect the performance, validity, reliability, etc. of the data forwarding of the network, so that the network can not work in the expected manner due to improper configuration or malicious modification of the configuration content, and the network becomes untrustworthy. In this paper, based on the above-mentioned network non-trust problem, a method for evaluating the reliability of a network composed of switches is proposed. Based on the research of the reliability of network information transmission, this paper studies the function principle of the switch, and studies the relation between the function of the network switch and the configuration order, and then analyzes the characteristics and the behavior of the network switch. state, thus the configuration of the network switch and the description mode of the network state are determined, a credibility evaluation framework of a network composed of a network switch is provided, the framework takes the configuration content of the network switch as a data source, and the network shape reflecting the network function is obtained through the data processing The state of the network is evaluated by the trusted expectation of the network, and the credibility of the configuration behavior is further evaluated by the transformation relation between the network state and the configuration behavior, so that the credibility evaluation of the network is realized. In this paper, the content of the trusted network is extended to the equipment of the trusted network, so as to ensure the user's credibility to the network equipment itself.
【學位授予單位】:北京工業(yè)大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP393.08
【參考文獻】
相關期刊論文 前4條
1 朱友文;黃劉生;陳國良;楊威;;分布式計算環(huán)境下的動態(tài)可信度評估模型[J];計算機學報;2011年01期
2 蔣澤;李雙慶;尹程果;;基于多維決策屬性的網(wǎng)絡用戶行為可信度評估[J];計算機應用研究;2011年06期
3 楊潤;文志誠;李巖巖;;一種基于模糊理論的P2P系統(tǒng)動態(tài)可信模型[J];計算機應用研究;2012年01期
4 劉勝利;王飛;;可信計算技術(shù)研究[J];徐州工程學院學報(自然科學版);2008年03期
本文編號:2416941
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2416941.html
最近更新
教材專著