浏览全部资源
扫码关注微信
哈尔滨理工大学计算机科学与技术学院,黑龙江 哈尔滨 150080
[ "罗智勇(1978- ),男,山东平度人,博士,哈尔滨理工大学教授,主要研究方向为计算机网络与信息安全、网络优化。" ]
[ "杨旭(1995- ),男,安徽合肥人,哈尔滨理工大学硕士生,主要研究方向为计算机网络与信息安全、网络优化。" ]
[ "孙广路(1979- ),男,黑龙江哈尔滨人,博士,哈尔滨理工大学教授,主要研究方向为计算机网络与信息安全、机器学习与智能信息处理。" ]
[ "谢志强(1962- ),男,博士,黑龙江哈尔滨人,哈尔滨理工大学教授,主要研究方向为企业智能计算与调度系统、数据处理、网络优化。" ]
[ "刘嘉辉(1974- ),男,博士,黑龙江牡丹江人,哈尔滨理工大学教授,主要研究方向为计算机网络与信息安全、网络优化。" ]
网络出版日期:2019-10,
纸质出版日期:2019-10-25
移动端阅览
罗智勇, 杨旭, 孙广路, 等. 基于马尔可夫的有限自动机入侵容忍系统模型[J]. 通信学报, 2019,40(10):79-89.
Zhiyong LUO, Xu YANG, Guanglu SUN, et al. Finite automaton intrusion tolerance system model based on Markov[J]. Journal on communications, 2019, 40(10): 79-89.
罗智勇, 杨旭, 孙广路, 等. 基于马尔可夫的有限自动机入侵容忍系统模型[J]. 通信学报, 2019,40(10):79-89. DOI: 10.11959/j.issn.1000-436x.2019196.
Zhiyong LUO, Xu YANG, Guanglu SUN, et al. Finite automaton intrusion tolerance system model based on Markov[J]. Journal on communications, 2019, 40(10): 79-89. DOI: 10.11959/j.issn.1000-436x.2019196.
为保证区域网被入侵时,系统仍然能为合法用户提供正常服务,设计了一种有限自动机入侵容忍模型。该模型在马尔可夫的理论基础上,通过建立状态转移概率矩阵来描述系统提供服务的状态变换关系,将转移状态进行量化求解,发现系统中关键结点。通过对关键结点的维护可以增强系统的容忍能力和提高服务的可靠性。实验对比表明,该模型不但具备很强的入侵容忍能力,在保障系统受到入侵时的完整性也具有明显优势。
To ensure that the system could still provide normal service for legitimate users when the LAN being invaded
a finite automaton intrusion tolerance model was designed.Based on Markov’s theory
the state transformation relationship of the service provided by the system by establishing the state transition probability matrix was described
quantified the transition state and found the key nodes in the system.The maintenance of key nodes could enhance the tolerance of the system and improve the reliability of the service.Experimental comparison shows that this model not only has strong intrusion tolerance
but also has obvious advantages in the integrity of the security system when it is invaded.
JAJODIA S , ALBANESE M . An integrated framework for cyber situation awareness [M ] // Theory and Models for Cyber Situation Awareness . Berlin:Springer , 2017 : 29 - 46 .
LUKTARHAN N , JIA X , HU L . Multi-stage attack detection algorithm based on hidden Markov model [C ] // International Conference on Web Information Systems and Mining . Springer , 2012 : 275 - 282 .
罗世亮 , 程良伦 . 面向复杂工业环境的信息物理融合系统可靠性 [J ] . 北京理工大学学报 , 2015 , 35 ( 9 ): 973 - 979 .
LUO S L , CHENG L L . Reliability research on cyber-physical systems for the complicated industrial environment [J ] . Transactions of Beijing Institute of Technology , 2015 , 35 ( 9 ): 973 - 979 .
席荣荣 , 云晓春 , 张永铮 . 一种改进的网络安全态势量化评估方法 [J ] . 计算机学报 , 2015 , 38 ( 4 ): 749 - 758 .
XI R R , YUN X C , ZHANG Y Z . An improved quantitative evaluation method for network security [J ] . Chinese Journal of Computers , 2015 , 38 ( 4 ): 749 - 758 .
邢云菲 , 栾春玉 . 一种改进的对入侵容忍系统的容忍度量化分析 [J ] . 情报科学 , 2015 , 33 ( 8 ): 55 - 58 ,78.
XING Y F , LUAN C Y . A quantitative analysis and detection of intrusion tolerance system model [J ] . Information Science , 2015 , 33 ( 8 ): 55 - 58 ,78.
刘进 . 基于高分子链的入侵容忍系统病毒吸附算法 [J ] . 科技通报 , 2014 ( 10 ): 103 - 105 .
LIU J . Virus adsorption optimization algorithm of intrusion tolerance system based on polymer chain [J ] . Bulletin of Science and Technology , 2014 ( 10 ): 103 - 105 .
徐晓斌 , 张光卫 , 王尚广 . 基于群体信任的 WSN 异常数据过滤方法 [J ] . 通信学报 , 2014 , 35 ( 5 ): 108 - 117 .
XU X B , ZHANG G W , WANG S G . Abnormal date filtering approach based on collective trust for WSN [J ] . Journal on Communications , 2014 , 35 ( 5 ): 108 - 117 .
孙蔚 . 基于网管系统的分布式入侵检测模型研究 [J ] . 电子设计工程 , 2014 , 22 ( 1 ): 165 - 167 .
SUN W . Research of distributed intrusion detection based on network management system [J ] . Electronic Design Engineering , 2014 , 22 ( 1 ): 165 - 167 .
DIVYA T , MUNIASAMY K . Real-time intrusion prediction using hidden Markov model with genetic algorithm [M]// Artificial intelligence and evolutionary algorithms in engineering systems.Berlin:Springer , 2015 : 731 - 736 .
KHOLIDY H A , ERRADI A , ABDELWAHED S , et al . A finite state hidden markov model for predicting multistage attacks in cloud systems [C ] // IEEE 12th International Conference on Dependable,Autonomic and Secure Computing . IEEE , 2014 : 14 - 19 .
HOLGADOP , VILLAGRA V A , VAZQUEZ L . Real-time multistep attack prediction based on Hidden Markov models [J ] . IEEE Transactions on Dependable & Secure Computing , 2017 ,PP( 99 ):1.
AHMADIAN R A , RASOOLZADEGAN A , JAVAN J A . A systematic review on intrusion detection based on the hidden Markov model [J ] . Statistical Analysis and Data Mining:The ASA Data Science Journal , 2018 , 11 ( 3 ): 111 - 134 .
王笑 , 戚湧 , 李千目 . 基于时变加权马尔可夫链的网络异常检测模型 [J ] . 计算机科学 , 2017 , 44 ( 9 ): 136 - 14 .
WANG X , QI Y , LI Q M . Network anomaly detection model based on time-varying weighted Markov chain [J ] . Computer Science , 2017 , 44 ( 9 ): 136 - 14 .
TRIVEDI K S . Probability and statistics with reliability queuing ,and computer science applications [M ] . 2nd ed . New York : John Wiley and SonsPress , 2002 .
魏柯 , 张帆 . 基于马尔可夫的网络容忍入侵能力评估建模 [J ] . 计算机仿真 , 2016 , 33 ( 7 ): 289 - 292 .
WEI K , ZHANG F . Based on Markov network tolerate invasion ability evaluation model [J ] . Computer Simulation , 2016 , 33 ( 7 ): 289 - 292 .
罗智勇 , 尤波 , 刘嘉辉 . 基于半马尔可夫的入侵容忍状态转移系统研究 [J ] . 北京理工大学学报 , 2016 , 36 ( 7 ): 712 - 717 .
LUO Z Y , YOU B , LIU J H . Research of the intrusion tolerance state transition system based on semi-Markov [J ] . Transactions of Beijing Institute of Technology , 2016 , 36 ( 7 ): 712 - 717 .
0
浏览量
1022
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构