網(wǎng)絡入侵中的可用節(jié)點優(yōu)化識別仿真研究
[Abstract]:The available nodes in the network intrusion can be identified accurately, and the available nodes can be found to ensure the normal operation of the network in the event of network intrusion. In the process of available node identification, the security of network nodes should be judged accurately and the availability of nodes should be calculated accurately. However, according to the topological potential theory, the available node identification model in network intrusion is constructed. However, the availability of network nodes can not be calculated accurately, resulting in a large number of invalid nodes in the identified nodes, which reduces the accuracy of node identification. In this paper, an optimal identification model of available nodes in network intrusion based on mutual information is proposed. In the above model, each edge of the intrusion network is defined as an information flow, the probability distribution of the same node on each side is obtained, and the confidentiality, integrity and availability of the nodes on the initial edge of the network are dimensionless. The weights of network confidentiality, integrity and availability in the state of network intrusion are compared, the decision matrix of network node security is established, and the identification index of node availability importance in network intrusion is calculated. The available node identification model in network intrusion is constructed by using the calculated results. The simulation results show that the proposed model can fully and effectively identify the available nodes in network intrusion and improve the connectivity of the network.
【作者單位】: 南開大學濱海學院;
【分類號】:TP393.08
【相似文獻】
相關期刊論文 前10條
1 肖軍;李春鳴;譚敬華;楊慶華;;發(fā)現(xiàn)網(wǎng)絡入侵及做好防范應注意的幾個問題[J];黑龍江科技信息;2011年27期
2 吳林錦;武東英;劉勝利;劉龍;;基于本體的網(wǎng)絡入侵知識庫模型研究[J];計算機科學;2013年09期
3 吳應良,韋崗;網(wǎng)絡入侵及其安全防范對策研究[J];計算機應用研究;2000年11期
4 崔毅,邵希娟;網(wǎng)絡入侵現(xiàn)象分析及防范對策[J];山西大學學報(自然科學版);2001年01期
5 曾澤建;網(wǎng)絡入侵與防御[J];川北教育學院學報;2002年03期
6 李睿;計算機網(wǎng)絡入侵與反入侵技術初探[J];企業(yè)技術開發(fā);2002年06期
7 周學廣;無線網(wǎng)絡入侵初探[J];通信技術;2002年10期
8 姜文凱;;怎樣防范網(wǎng)絡入侵?[J];金融電子化;2002年12期
9 梁云杰;網(wǎng)絡入侵與檢測技術分析[J];河南職業(yè)技術師范學院學報;2003年01期
10 向建國,夏長城;網(wǎng)絡入侵取證系統(tǒng)(Ⅰ)[J];湘南學院學報;2004年02期
相關會議論文 前10條
1 錢桂瓊;許榕生;;網(wǎng)絡入侵取證審計數(shù)據(jù)分析技術的研究[A];第十七次全國計算機安全學術交流會暨電子政務安全研討會論文集[C];2002年
2 張樂;郝文江;武捷;;美國網(wǎng)絡入侵信息披露制度簡介[A];全國計算機安全學術交流會論文集·第二十五卷[C];2010年
3 鐘華;陶妍丹;;基于攻擊聚類的計算機網(wǎng)絡入侵預警研究[A];2007北京地區(qū)高校研究生學術交流會通信與信息技術會議論文集(上冊)[C];2008年
4 范曉嵐;姜建國;曾啟銘;;BO網(wǎng)絡入侵的實時檢測[A];中國工程物理研究院科技年報(1999)[C];1999年
5 王娟;舒敏;傅,
本文編號:2483741
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2483741.html