Evaluation for Network Security Based on the Read-Write Transition Model
The evaluation of network security is a hot issue in present research of network security. After acquiring each hosts confidentiality, integrity and availability evaluation index by attacking the network, we can directly evaluate the network security. But, for the network with Read-Write management privilege setting to the root directory, it is necessary to execute the state transition of the security attribute value by reason of the existence of root directory Read-Write relationship. Firstly, the Read-Write transition model and correlative concepts are presented for the root directory with Read-Write privilege setting;then the model transition function is formalized by the state transition arithmetic operator 0. Based on the transition model, we have designed the network security state transition machine and the network security evaluation model. Finally, the methods feasibility and validity are verified by practical example analysis.
Read-Write transition model network security evaluation modeling
Zhiyong LU Chaojing TANG Zhiyong LU
College of Electronic Science and Engineering National University of Defense Technology Changsha,Chi Unit 63880 LuoYang,China
国际会议
The 2nd IEEE International Conference on Advanced Computer Control(第二届先进计算机控制国际会议 ICACC 2010)
沈阳
英文
420-424
2010-03-27(万方平台首次上网日期,不代表论文的发表时间)