基于交換機(jī)配置行為的網(wǎng)絡(luò)可信性評估
發(fā)布時間:2019-01-28 09:37
【摘要】:隨著Internet的發(fā)展,網(wǎng)絡(luò)呈現(xiàn)復(fù)雜、異構(gòu)、多樣等特點(diǎn),使網(wǎng)絡(luò)的安全問題變得越來越突出,目前,網(wǎng)絡(luò)的不可信給網(wǎng)絡(luò)的安全提出了新的挑戰(zhàn)�?尚啪W(wǎng)絡(luò)包括服務(wù)提供者、終端用戶以及網(wǎng)絡(luò)本身的可信內(nèi)涵,隨著局域網(wǎng)的廣泛應(yīng)用,網(wǎng)絡(luò)交換機(jī)成為實(shí)現(xiàn)網(wǎng)絡(luò)數(shù)據(jù)轉(zhuǎn)發(fā)的關(guān)鍵設(shè)備,由于網(wǎng)絡(luò)交換機(jī)需要管理員的配置才能實(shí)現(xiàn)相應(yīng)的功能,,而不同的功能會使網(wǎng)絡(luò)提供數(shù)據(jù)轉(zhuǎn)發(fā)的性能、有效性、可靠性等受到影響,所以由于不正確的配置或者惡意修改配置內(nèi)容都會使網(wǎng)絡(luò)改變其運(yùn)行方式,導(dǎo)致網(wǎng)絡(luò)不能按照預(yù)期的方式工作,而使網(wǎng)絡(luò)變得不可信。本文基于以上的網(wǎng)絡(luò)不可信問題,提出了一種由交換機(jī)組成的網(wǎng)絡(luò)的可信性評估方法。 基于對網(wǎng)絡(luò)信息傳輸?shù)目尚艈栴}的研究,本文研究了交換機(jī)的功能原理,并研究了網(wǎng)絡(luò)交換機(jī)功能與配置命令間的關(guān)系,在此基礎(chǔ)上了分析網(wǎng)絡(luò)交換機(jī)的特性及其行為狀態(tài),由此確定了網(wǎng)絡(luò)交換機(jī)的配置和網(wǎng)絡(luò)狀態(tài)的描述方式,提出了一種由網(wǎng)絡(luò)交換機(jī)組成的網(wǎng)絡(luò)的可信性評估框架,該框架以網(wǎng)絡(luò)交換機(jī)的配置內(nèi)容為數(shù)據(jù)來源,經(jīng)過數(shù)據(jù)處理獲得反映網(wǎng)絡(luò)功能的網(wǎng)絡(luò)狀態(tài),并通過網(wǎng)絡(luò)的可信預(yù)期來評估網(wǎng)絡(luò)狀態(tài)的可信程度,進(jìn)一步通過網(wǎng)絡(luò)狀態(tài)與配置行為間的轉(zhuǎn)化關(guān)系評估配置行為的可信性,從而實(shí)現(xiàn)對網(wǎng)絡(luò)的可信性評估。本文將可信網(wǎng)絡(luò)的內(nèi)容擴(kuò)展到可信網(wǎng)絡(luò)的設(shè)備上,以保證用戶對網(wǎng)絡(luò)設(shè)備自身運(yùn)行的可信性要求。
[Abstract]:With the development of the Internet, the network has the characteristics of complex, heterogeneous, diverse and so on, so that the security problem of the network becomes more and more prominent. At present, the untrustworthy network of the network poses a new challenge to the security of the network. the trusted network comprises a service provider, an end user and a trusted connotation of the network itself, and with the wide application of the local area network, the network switch becomes the key equipment for realizing the network data forwarding, different functions may affect the performance, validity, reliability, etc. of the data forwarding of the network, so that the network can not work in the expected manner due to improper configuration or malicious modification of the configuration content, and the network becomes untrustworthy. In this paper, based on the above-mentioned network non-trust problem, a method for evaluating the reliability of a network composed of switches is proposed. Based on the research of the reliability of network information transmission, this paper studies the function principle of the switch, and studies the relation between the function of the network switch and the configuration order, and then analyzes the characteristics and the behavior of the network switch. state, thus the configuration of the network switch and the description mode of the network state are determined, a credibility evaluation framework of a network composed of a network switch is provided, the framework takes the configuration content of the network switch as a data source, and the network shape reflecting the network function is obtained through the data processing The state of the network is evaluated by the trusted expectation of the network, and the credibility of the configuration behavior is further evaluated by the transformation relation between the network state and the configuration behavior, so that the credibility evaluation of the network is realized. In this paper, the content of the trusted network is extended to the equipment of the trusted network, so as to ensure the user's credibility to the network equipment itself.
【學(xué)位授予單位】:北京工業(yè)大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP393.08
本文編號:2416941
[Abstract]:With the development of the Internet, the network has the characteristics of complex, heterogeneous, diverse and so on, so that the security problem of the network becomes more and more prominent. At present, the untrustworthy network of the network poses a new challenge to the security of the network. the trusted network comprises a service provider, an end user and a trusted connotation of the network itself, and with the wide application of the local area network, the network switch becomes the key equipment for realizing the network data forwarding, different functions may affect the performance, validity, reliability, etc. of the data forwarding of the network, so that the network can not work in the expected manner due to improper configuration or malicious modification of the configuration content, and the network becomes untrustworthy. In this paper, based on the above-mentioned network non-trust problem, a method for evaluating the reliability of a network composed of switches is proposed. Based on the research of the reliability of network information transmission, this paper studies the function principle of the switch, and studies the relation between the function of the network switch and the configuration order, and then analyzes the characteristics and the behavior of the network switch. state, thus the configuration of the network switch and the description mode of the network state are determined, a credibility evaluation framework of a network composed of a network switch is provided, the framework takes the configuration content of the network switch as a data source, and the network shape reflecting the network function is obtained through the data processing The state of the network is evaluated by the trusted expectation of the network, and the credibility of the configuration behavior is further evaluated by the transformation relation between the network state and the configuration behavior, so that the credibility evaluation of the network is realized. In this paper, the content of the trusted network is extended to the equipment of the trusted network, so as to ensure the user's credibility to the network equipment itself.
【學(xué)位授予單位】:北京工業(yè)大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前4條
1 朱友文;黃劉生;陳國良;楊威;;分布式計(jì)算環(huán)境下的動態(tài)可信度評估模型[J];計(jì)算機(jī)學(xué)報(bào);2011年01期
2 蔣澤;李雙慶;尹程果;;基于多維決策屬性的網(wǎng)絡(luò)用戶行為可信度評估[J];計(jì)算機(jī)應(yīng)用研究;2011年06期
3 楊潤;文志誠;李巖巖;;一種基于模糊理論的P2P系統(tǒng)動態(tài)可信模型[J];計(jì)算機(jī)應(yīng)用研究;2012年01期
4 劉勝利;王飛;;可信計(jì)算技術(shù)研究[J];徐州工程學(xué)院學(xué)報(bào)(自然科學(xué)版);2008年03期
本文編號:2416941
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2416941.html
最近更新
教材專著