網(wǎng)絡(luò)入侵中的可用節(jié)點(diǎn)優(yōu)化識(shí)別仿真研究
[Abstract]:The available nodes in the network intrusion can be identified accurately, and the available nodes can be found to ensure the normal operation of the network in the event of network intrusion. In the process of available node identification, the security of network nodes should be judged accurately and the availability of nodes should be calculated accurately. However, according to the topological potential theory, the available node identification model in network intrusion is constructed. However, the availability of network nodes can not be calculated accurately, resulting in a large number of invalid nodes in the identified nodes, which reduces the accuracy of node identification. In this paper, an optimal identification model of available nodes in network intrusion based on mutual information is proposed. In the above model, each edge of the intrusion network is defined as an information flow, the probability distribution of the same node on each side is obtained, and the confidentiality, integrity and availability of the nodes on the initial edge of the network are dimensionless. The weights of network confidentiality, integrity and availability in the state of network intrusion are compared, the decision matrix of network node security is established, and the identification index of node availability importance in network intrusion is calculated. The available node identification model in network intrusion is constructed by using the calculated results. The simulation results show that the proposed model can fully and effectively identify the available nodes in network intrusion and improve the connectivity of the network.
【作者單位】: 南開(kāi)大學(xué)濱海學(xué)院;
【分類(lèi)號(hào)】:TP393.08
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 肖軍;李春鳴;譚敬華;楊慶華;;發(fā)現(xiàn)網(wǎng)絡(luò)入侵及做好防范應(yīng)注意的幾個(gè)問(wèn)題[J];黑龍江科技信息;2011年27期
2 吳林錦;武東英;劉勝利;劉龍;;基于本體的網(wǎng)絡(luò)入侵知識(shí)庫(kù)模型研究[J];計(jì)算機(jī)科學(xué);2013年09期
3 吳應(yīng)良,韋崗;網(wǎng)絡(luò)入侵及其安全防范對(duì)策研究[J];計(jì)算機(jī)應(yīng)用研究;2000年11期
4 崔毅,邵希娟;網(wǎng)絡(luò)入侵現(xiàn)象分析及防范對(duì)策[J];山西大學(xué)學(xué)報(bào)(自然科學(xué)版);2001年01期
5 曾澤建;網(wǎng)絡(luò)入侵與防御[J];川北教育學(xué)院學(xué)報(bào);2002年03期
6 李睿;計(jì)算機(jī)網(wǎng)絡(luò)入侵與反入侵技術(shù)初探[J];企業(yè)技術(shù)開(kāi)發(fā);2002年06期
7 周學(xué)廣;無(wú)線(xiàn)網(wǎng)絡(luò)入侵初探[J];通信技術(shù);2002年10期
8 姜文凱;;怎樣防范網(wǎng)絡(luò)入侵?[J];金融電子化;2002年12期
9 梁云杰;網(wǎng)絡(luò)入侵與檢測(cè)技術(shù)分析[J];河南職業(yè)技術(shù)師范學(xué)院學(xué)報(bào);2003年01期
10 向建國(guó),夏長(zhǎng)城;網(wǎng)絡(luò)入侵取證系統(tǒng)(Ⅰ)[J];湘南學(xué)院學(xué)報(bào);2004年02期
相關(guān)會(huì)議論文 前10條
1 錢(qián)桂瓊;許榕生;;網(wǎng)絡(luò)入侵取證審計(jì)數(shù)據(jù)分析技術(shù)的研究[A];第十七次全國(guó)計(jì)算機(jī)安全學(xué)術(shù)交流會(huì)暨電子政務(wù)安全研討會(huì)論文集[C];2002年
2 張樂(lè);郝文江;武捷;;美國(guó)網(wǎng)絡(luò)入侵信息披露制度簡(jiǎn)介[A];全國(guó)計(jì)算機(jī)安全學(xué)術(shù)交流會(huì)論文集·第二十五卷[C];2010年
3 鐘華;陶妍丹;;基于攻擊聚類(lèi)的計(jì)算機(jī)網(wǎng)絡(luò)入侵預(yù)警研究[A];2007北京地區(qū)高校研究生學(xué)術(shù)交流會(huì)通信與信息技術(shù)會(huì)議論文集(上冊(cè))[C];2008年
4 范曉嵐;姜建國(guó);曾啟銘;;BO網(wǎng)絡(luò)入侵的實(shí)時(shí)檢測(cè)[A];中國(guó)工程物理研究院科技年報(bào)(1999)[C];1999年
5 王娟;舒敏;傅,
本文編號(hào):2483741
本文鏈接:http://www.sikaile.net/guanlilunwen/ydhl/2483741.html