[1]李伟伟 张涛 林为民 邓松 时坚 汪晨.基于动态网络行为可信度量的安全审计[J].计算机技术与发展,2012,(05):250-253.
 LI Wei-wei,ZHANG Tao,LIN Wei-min,et al.Security Audit Based on Dynamic Amount of Network Behavior Trust[J].,2012,(05):250-253.
点击复制

基于动态网络行为可信度量的安全审计()

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年05期
页码:
250-253
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Security Audit Based on Dynamic Amount of Network Behavior Trust
文章编号:
1673-629X(2012)05-0250-04
作者:
李伟伟 张涛 林为民 邓松 时坚 汪晨
国网电力科学研究院信息与通信研究所
Author(s):
LI Wei-wei ZHANG Tao LIN Wei-min DENG Song SHI Jian WANG Chen
Institute of Information and Communication, State Grid Electric Power Research Institute
关键词:
数据挖掘行为可信安全审计访问控制
Keywords:
data mining behavior trust security audit access control
分类号:
TP393
文献标志码:
A
摘要:
安全审计系统作为一种对用户网络行为的有效监督手段,对网络行为的可追溯和可控制起着重要作用。文中提出了一种基于动态网络可信度量的安全审计方法。该方法根据网络的实时日志信息,周期性对其进行数据挖掘生成规则,并将规则应用到数据流的过滤中。根据数据流与规则的匹配情况进行动态的可信度量,使得系统对可信行为和危险行为形成不同的安全访问控制机制。较以前以固定规则应对变化的访问控制和过滤,所提出的方法具有很好的适用性和灵活性
Abstract:
Security audit system plays an important role in user network behavior. It makes sure that the network behavior can be controlled and traced back. It proposed a design of security audit based on dynamic amount of network behavior trust, which periodically gen- erated rules by mining latest logs and applied rules to the date stream filtering. This design generated different security access control mechanism for trusted behavior and risk behavior,based on matching date flow with roles to measure network behavior trust. Comparing to existing systems which made constant rules to respond to mutative access control and filtering, this design had great applicability and flexibility

相似文献/References:

[1]项响琴 汪彩梅.基于聚类高维空间算法的离群数据挖掘技术研究[J].计算机技术与发展,2010,(01):120.
 XIANG Xiang-qin,WANG Cai-mei.Study of Outlier Data Mining Based on CLIQUE Algorithm[J].,2010,(05):120.
[2]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
 LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(05):143.
[3]吉同路 柏永飞 王立松.住宅与房地产电子政务中数据挖掘的应用研究[J].计算机技术与发展,2010,(01):235.
 JI Tong-lu,BAI Yong-fei,WANG Li-song.Study and Application of Data Mining in E-government of House and Real Estate Industry[J].,2010,(05):235.
[4]杨静 张楠男 李建 刘延明 梁美红.决策树算法的研究与应用[J].计算机技术与发展,2010,(02):114.
 YANG Jing,ZHANG Nan-nan,LI Jian,et al.Research and Application of Decision Tree Algorithm[J].,2010,(05):114.
[5]赵裕啸 倪志伟 王园园 伍章俊.SQL Server 2005数据挖掘技术在证券客户忠诚度的应用[J].计算机技术与发展,2010,(02):229.
 ZHAO Yu-xiao,NI Zhi-wei,WANG Yuan-yuan,et al.Application of Data Mining Technology of SQL Server 2005 in Customer Loyalty Model in Securities Industry[J].,2010,(05):229.
[6]张笑达 徐立臻.一种改进的基于矩阵的频繁项集挖掘算法[J].计算机技术与发展,2010,(04):93.
 ZHANG Xiao-da,XU Li-zhen.An Advanced Frequent Itemsets Mining Algorithm Based on Matrix[J].,2010,(05):93.
[7]王爱平 王占凤 陶嗣干 燕飞飞.数据挖掘中常用关联规则挖掘算法[J].计算机技术与发展,2010,(04):105.
 WANG Ai-ping,WANG Zhan-feng,TAO Si-gan,et al.Common Algorithms of Association Rules Mining in Data Mining[J].,2010,(05):105.
[8]张广路 雷景生 吴兴惠.一种改进的Apriori关联规则挖掘算法(英文)[J].计算机技术与发展,2010,(06):84.
 ZHANG Guang-lu,LEI Jing-sheng,WU Xing-hui.An Improved Apriori Algorithm for Mining Association Rules[J].,2010,(05):84.
[9]吴楠 胡学钢.基于聚类分区的序列模式挖掘算法研究[J].计算机技术与发展,2010,(06):109.
 WU Nan,HU Xue-gang.Research on Clustering Partition-Based Approach of Sequential Pattern Mining[J].,2010,(05):109.
[10]吴青 傅秀芬.水平分布数据库的正负关联规则挖掘[J].计算机技术与发展,2010,(06):113.
 WU Qing,FU Xiu-fen.Positive and Negative Association Rules Mining on Horizontally Partitioned Database[J].,2010,(05):113.

备注/Memo

备注/Memo:
国家电网公司科技攻关团队项目(SG11034)李伟伟(1985-),女,山东青岛人,助理工程师,硕士,主要研究领域为信息安全;张涛,硕士,高级工程师,主要研究领域为信息安全
更新日期/Last Update: 1900-01-01