期刊文献+
共找到466篇文章
< 1 2 24 >
每页显示 20 50 100
Impact of ionospheric irregularity on SBAS integrity:spatial threat modeling and improvement 被引量:2
1
作者 BAO Junjie LI Rui +1 位作者 LIU Pan HUANG Zhigang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第5期908-917,共10页
The ionosphere, as the largest and least predictable error source, its behavior cannot be observed at all places simultaneously. The confidence bound, called the grid ionospheric vertical error(GIVE), can only be dete... The ionosphere, as the largest and least predictable error source, its behavior cannot be observed at all places simultaneously. The confidence bound, called the grid ionospheric vertical error(GIVE), can only be determined with the aid of a threat model which is used to restrict the expected ionospheric behavior. However, the spatial threat model at present widespread used, which is based on fit radius and relative centroid metric(RCM), is too conservative or the resulting GIVEs will be too large and will reduce the availability of satellite-based augmentation system(SBAS). In this paper, layered two-dimensional parameters, the vertical direction double RCMs, are introduced based on the spatial variability of the ionosphere. Comparing with the traditional threat model, the experimental results show that the user ionospheric vertical error(UIVE) average reduction rate reaches 16%. And the 95% protection level of conterminous United States(CONUS) is 28%, even under disturbed days, which reaches about 5% reduction rates.The results show that the system service performance has been improved better. 展开更多
关键词 ionospheric delay spatial threat model relative centroid metric(RCM) user ionospheric vertical error(UIVE)
在线阅读 下载PDF
Threat Modeling-Oriented Attack Path Evaluating Algorithm
2
作者 李晓红 刘然 +1 位作者 冯志勇 何可 《Transactions of Tianjin University》 EI CAS 2009年第3期162-167,共6页
In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in ... In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage.Besides,an algorithm of searching attack path was also obtained in accordence with its definition.Finally,an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree,the weight distribution information,and the attack paths.An example threat tree is given to verify the effectiveness of the algorithms. 展开更多
关键词 attack tree attack path threat modeling threat coefficient attack path evaluation
在线阅读 下载PDF
Threat Modeling and Application Research Based on Multi-Source Attack and Defense Knowledge
3
作者 Shuqin Zhang Xinyu Su +2 位作者 Peiyu Shi Tianhui Du Yunfei Han 《Computers, Materials & Continua》 SCIE EI 2023年第10期349-377,共29页
Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to u... Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment. 展开更多
关键词 Multi-source data fusion threat modeling threat propagation path knowledge graph intelligent defense decision-making
在线阅读 下载PDF
Blockchain applied to the construction supply chain:A case study with threat model 被引量:2
4
作者 Gjorgji SHEMOV Borja GARCIA de SOTO Hoda ALKHZAIMI 《Frontiers of Engineering Management》 2020年第4期564-577,共14页
The construction industry has long faced the challenge of introducing collaborative systems among multiple stakeholders.This challenge creates a high level of rigidity in terms of processing shared information related... The construction industry has long faced the challenge of introducing collaborative systems among multiple stakeholders.This challenge creates a high level of rigidity in terms of processing shared information related to different processes,robust holistic regulations,payment actualizations,and resource utilization across different nodes.The need for a digital platform to crossconnect all stakeholders is necessary.A blockchain-based platform is a prime candidate to improve the industry in general and the construction supply chain(CSC)in particular.In this paper,a literature review is presented to establish the main challenges that CSC faces in terms of its effects on productivity and efficiency.In addition,the effect of applying blockchain platforms on a case study is presented and analyzed from performance and security level.The analysis aims to emphasize that blockchain,as presented in this paper,is a viable solution to the challenges in the CSC regardless of the risks associated with the security and robustness of the flow of information and data protection.Moreover,a threat analysis of applying a blockchain model on the CSC industry is introduced.This model indicates potential attacks and possible countermeasures to prevent the attacks.Future work is needed to expand,quantify,and optimize the threat model and conduct simulations considering proposed countermeasures for the different blockchain attacks outlined in this study. 展开更多
关键词 blockchain taxonomy construction supply chain threat model analysis security level analysis CYBERSECURITY VULNERABILITY smart contract cyber-attack
原文传递
Application Research on Two-Layer Threat Prediction Model Based on Event Graph
5
作者 Shuqin Zhang Xinyu Su +2 位作者 Yunfei Han Tianhui Du Peiyu Shi 《Computers, Materials & Continua》 SCIE EI 2023年第12期3993-4023,共31页
Advanced Persistent Threat(APT)is now the most common network assault.However,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks.The... Advanced Persistent Threat(APT)is now the most common network assault.However,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks.They cannot provide rapid and accurate early warning and decision responses to the present system state because they are inadequate at deducing the risk evolution rules of network threats.To address the above problems,firstly,this paper constructs the multi-source threat element analysis ontology(MTEAO)by integrating multi-source network security knowledge bases.Subsequently,based on MTEAO,we propose a two-layer threat prediction model(TL-TPM)that combines the knowledge graph and the event graph.The macro-layer of TL-TPM is based on the knowledge graph to derive the propagation path of threats among devices and to correlate threat elements for threat warning and decision-making;The micro-layer ingeniously maps the attack graph onto the event graph and derives the evolution path of attack techniques based on the event graph to improve the explainability of the evolution of threat events.The experiment’s results demonstrate that TL-TPM can completely depict the threat development trend,and the early warning results are more precise and scientific,offering knowledge and guidance for active defense. 展开更多
关键词 Knowledge graph multi-source data fusion network security threat modeling event graph absorbing Markov chain threat propagation path
在线阅读 下载PDF
Automating threat modeling using an ontology framework
6
作者 Margus Vaja Fredrik Heiding +1 位作者 Ulrik Franke Robert Lagerstro 《Cybersecurity》 CSCD 2020年第1期281-300,共20页
Threat modeling is of increasing importance to IT security,and it is a complex and resource demanding task.The aim of automating threat modeling is to simplify model creation by using data that are already available.H... Threat modeling is of increasing importance to IT security,and it is a complex and resource demanding task.The aim of automating threat modeling is to simplify model creation by using data that are already available.However,the collected data often lack context;this can make the automated models less precise in terms of domain knowledge than those created by an expert human modeler.The lack of domain knowledge in modeling automation can be addressed with ontologies.In this paper,we introduce an ontology framework to improve automatic threat modeling.The framework is developed with conceptual modeling and validated using three different datasets:a small scale utility lab,water utility control network,and university IT environment.The framework produced successful results such as standardizing input sources,removing duplicate name entries,and grouping application software more logically. 展开更多
关键词 threat modeling Ontologies Automated modeling Conceptual models Ontology framework
原文传递
Automating threat modeling using an ontology framework
7
作者 Margus Valja Fredrik Heiding +1 位作者 Ulrik Franke Robert Lagerstrom 《Cybersecurity》 2018年第1期893-912,共20页
Threat modeling is of increasing importance to IT security,and it is a complex and resource demanding task.The aim of automating threat modeling is to simplify model creation by using data that are already available.H... Threat modeling is of increasing importance to IT security,and it is a complex and resource demanding task.The aim of automating threat modeling is to simplify model creation by using data that are already available.However,the collected data often lack context;this can make the automated models less precise in terms of domain knowledge than those created by an expert human modeler.The lack of domain knowledge in modeling automation can be addressed with ontologies.In this paper,we introduce an ontology framework to improve automatic threat modeling.The framework is developed with conceptual modeling and validated using three different datasets:a small scale utility lab,water utility control network,and university IT environment.The framework produced successful results such as standardizing input sources,removing duplicate name entries,and grouping application software more logically. 展开更多
关键词 threat modeling Ontologies Automated modeling Conceptual models Ontology framework
原文传递
Cyber Resilience through Real-Time Threat Analysis in Information Security
8
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience Real-Time threat Analysis Cyber threats Cyberattacks threat Intelligence Machine Learning Artificial Intelligence threat Detection threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME threat Actors threat modeling Security Architecture
在线阅读 下载PDF
信息系统“Insider threat”分析及其解决方案 被引量:2
9
作者 王辉 刘淑芬 张欣佳 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2006年第5期809-813,共5页
为了更好地辅助管理人员对信息系统安全策略配置的系统化认识,对具有代表性的内部威胁的分类和建模方法进行了分析研究,并比较了各种方法的优、缺点。同时,在探讨了减少内部威胁的不同解决方案的基础上,提出了一个能尽可能减少内部威胁... 为了更好地辅助管理人员对信息系统安全策略配置的系统化认识,对具有代表性的内部威胁的分类和建模方法进行了分析研究,并比较了各种方法的优、缺点。同时,在探讨了减少内部威胁的不同解决方案的基础上,提出了一个能尽可能减少内部威胁的改良方案。 展开更多
关键词 计算机应用 内部威胁 内部攻击 信息系统 分类 建模
在线阅读 下载PDF
基于博弈论的主客观综合权重威胁等级识别
10
作者 张连炜 李文博 +2 位作者 张立东 董春曦 董阳阳 《太赫兹科学与电子信息学报》 2025年第3期247-255,共9页
辐射源威胁等级识别是干扰资源分配的重要依据,目前工程上常用的威胁等级判断方法,只考虑单一的方法进行指标赋权,具有较强的主观因素,得出的结果往往不具备合理性。针对以上问题,提出一种基于博弈论的主客观综合权重威胁等级识别方法... 辐射源威胁等级识别是干扰资源分配的重要依据,目前工程上常用的威胁等级判断方法,只考虑单一的方法进行指标赋权,具有较强的主观因素,得出的结果往往不具备合理性。针对以上问题,提出一种基于博弈论的主客观综合权重威胁等级识别方法。该方法利用载频、脉冲宽度、脉冲重复周期和占空比4个威胁指标建立相应的隶属度函数,利用博弈论的思想将层析分析法和熵值法的权重相结合得到综合权重;将权重与隶属度相结合得到威胁等级识别结果。本文对多环境战场的雷达辐射源参数进行了分析,结果表明,使用基于博弈论的威胁等级评判方法相比于只使用单一的评判方法能够提供更加合理的结果,达到了对多辐射源场景的良好识别。 展开更多
关键词 隶属度模型 威胁等级判定 博弈论 综合权重
在线阅读 下载PDF
无人机3维航迹规划仿真平台
11
作者 王哲胜 杨柳庆 张勇 《兵工自动化》 北大核心 2025年第1期76-81,共6页
针对目前无人机航迹规划研究多集中于算法的改进,存在规划结果3维直观显示不足的问题,创建一个基于Matlab软件的无人机3维航迹规划仿真平台。利用Matlab软件自带的App designer功能完成图形用户界面开发,建立基于地形威胁的地图模型,使... 针对目前无人机航迹规划研究多集中于算法的改进,存在规划结果3维直观显示不足的问题,创建一个基于Matlab软件的无人机3维航迹规划仿真平台。利用Matlab软件自带的App designer功能完成图形用户界面开发,建立基于地形威胁的地图模型,使用多种目前市面常见的群智能算法,直观比较各种群智能算法之间的区别,并根据需求添加算法与现有算法进行比较。设计平台能实现包含多种群智能算法的3维航迹规划,用于验证算法的可行性和可靠性,并直观反映出新型算法的优势。平台的实际操作结果表明,该平台具备对航迹规划算法结果的3维直观显示能力。 展开更多
关键词 无人机 威胁源模型 航迹规划 仿真平台
在线阅读 下载PDF
Security Threats to Business Information Systems Using NFC Read/Write Mode
12
作者 Sergio Rios-Aguilar Marta Beltrán González-Crespo Rubén 《Computers, Materials & Continua》 SCIE EI 2021年第6期2955-2969,共15页
Radio Frequency IDentification(RFID)and related technologies such as Near Field Communication(NFC)are becoming essential in industrial contexts thanks to their ability to perform contactless data exchange,either devic... Radio Frequency IDentification(RFID)and related technologies such as Near Field Communication(NFC)are becoming essential in industrial contexts thanks to their ability to perform contactless data exchange,either device-to-device or tag-to-device.One of the three main operation modes of NFC,called read/write mode,makes use of the latter type of interaction.It is extensively used in business information systems that make use of NFC tags to provide the end-user with augmented information in one of several available NFC data exchange formats,such as plain text,simple URLs or enriched URLs.Using a wide variety of physical form factors,NFC-compatible tags(wireless transponders)are currently available in many locations with applications going from smart posters,contactless tokens,tap-and-go payments or transport ticketing to automated device configuration,patient identification at hospitals or inventory management within supply chains.Most of these applications handle sensitive processes or data.This paper proposes a complete security threat model for the read/write operation mode of NFC used in Next Generation Industrial IoT(Nx-IIoT)contexts.This model,based on a wellknown methodology,STRIDE,allows developers and users to identify NFC applications vulnerabilities or weaknesses,analyze potential threats,propose risk management strategies,and design mitigation mechanisms to mention only some significant examples. 展开更多
关键词 Near field communications read/write NFC SECURITY threat modelling STRIDE Nx-IIoT
在线阅读 下载PDF
基于多模式融合的湖北逐时短时强降水预报方法改进
13
作者 万羽 许冠宇 +2 位作者 钟敏 刘瑞雪 刘文婷 《干旱气象》 2025年第1期143-152,共10页
随着全球气候变暖的加剧,极端强降水事件发生频率明显增加,对经济社会发展及人民生命财产安全构成重大威胁。开展短时强降水的预报研究对于防灾减灾具有重要意义。基于湖北省区域自动站降水资料、短时强降水概率预报产品和中尺度高分辨... 随着全球气候变暖的加剧,极端强降水事件发生频率明显增加,对经济社会发展及人民生命财产安全构成重大威胁。开展短时强降水的预报研究对于防灾减灾具有重要意义。基于湖北省区域自动站降水资料、短时强降水概率预报产品和中尺度高分辨率数值模式资料,采用邻域最优概率法和多模式融合技术对湖北省1~12 h短时强降水的落区进行预报与检验评估。结果表明,邻域法明显提高了中尺度数值模式对短时强降水的预报能力,其中面积邻域法的效果优于单点邻域法,CMAMESO、CMA-SH9和WH-RUC模式的最优面积概率均为5%,最优邻域半径分别为50、60、60 km;多模式融合预报方法较单模式单点邻域法表现出明显优势,2023年、2024年4—9月短时强降水的1~12 h TS评分均表现为正技巧,分别提高0.014、0.020;改进后的多模式融合方法对短时强降水的命中率有大幅提升,尤其是在湖北省2023年8月7日和2024年6月28日的多次强对流过程预报中均有提前精准预报。 展开更多
关键词 短时强降水 高分辨率模式 邻域法 多模式融合 TS评分
在线阅读 下载PDF
Development of the Software Application with Graphical User Interface for One Model Cyber Security
14
作者 Ramaz R. Shamugia 《International Journal of Communications, Network and System Sciences》 2019年第12期199-208,共10页
The article is dedicated to the development of software application with graphical user interface for analyzing of the operation of Integrated System of Data Defense from cyber-threats (ISDD) which includes subsystems... The article is dedicated to the development of software application with graphical user interface for analyzing of the operation of Integrated System of Data Defense from cyber-threats (ISDD) which includes subsystems of detection and elimination of vulnerabilities existing in the system, as well as Requests of Unauthorized Access (RUA). In the subsystems of eliminations of vulnerabilities and queues of unauthorized access considered as multichannel queueing systems with corresponding servers and queues, at random times there come requests to fix threats detected by the system. It is supposed that flows of requests demanding to eliminate threats coming to the mentioned subsystems of queueing systems are described with the Poisson distribution of probabilities, but processes of their elimination obey exponential law. For the system described above, there has been developed software realization of graphical interface which allows easily to change input parameters and observe graphical reflection of changes of the output indicators of the system. 展开更多
关键词 CYBER SECURITY DATA SECURITY CYBER threats Cyber-Vulnerability modelling of Cyber-threats CYBER Space DATA PROTECTION QUEUEING Systems
在线阅读 下载PDF
大语言模型在威胁情报生成方面的研究进展 被引量:1
15
作者 池亚平 吴冰 徐子涵 《信息安全研究》 CSCD 北大核心 2024年第11期1028-1035,共8页
在计算机语言处理的广阔领域中,一种被称为大语言模型的革命性实体崭露头角,以其理解复杂语言模式和产生一致且上下文相关回应的巨大能力而引起关注.大语言模型是一种人工智能模型,已经成为各种任务的强大工具,包括自然语言处理、机器... 在计算机语言处理的广阔领域中,一种被称为大语言模型的革命性实体崭露头角,以其理解复杂语言模式和产生一致且上下文相关回应的巨大能力而引起关注.大语言模型是一种人工智能模型,已经成为各种任务的强大工具,包括自然语言处理、机器翻译和问答.在威胁情报的实际应用中这些模型表现出色,特别是在实体识别、事件分析和关系抽取等关键任务上取得了显著的优势.其上下文理解的能力使其能够更好地处理复杂的威胁情境,而多层次表示学习使其能够捕捉文本的不同层次结构.此外,大语言模型通过迁移学习的方式,将在通用语言理解上获得的知识迁移到威胁情报任务中,提高了模型对不同领域和特定任务的适应性.这一研究趋势不仅推动了威胁情报领域的技术创新,也为更加智能、高效的威胁分析和应对提供了新的可能性.然而,随着研究的深入,仍需解决数据异构性、隐私保护等问题,以便更好地推动大语言模型在威胁情报领域的可持续发展. 展开更多
关键词 大语言模型 威胁情报 自然语言处理 TRANSFORMER 应用挑战
在线阅读 下载PDF
基于攻击路径的国产计算机威胁模型
16
作者 苏振宇 《山东工业技术》 2024年第6期84-89,共6页
针对信息技术应用创新产业(信创)广泛使用的国产计算机面临的安全威胁,提出一种基于攻击路径的威胁模型。在威胁发现阶段,根据国产计算机的脆弱性及面临的安全风险,建立了威胁模型并进行逐级分解,形成了具体的攻击路径。在威胁量化阶段... 针对信息技术应用创新产业(信创)广泛使用的国产计算机面临的安全威胁,提出一种基于攻击路径的威胁模型。在威胁发现阶段,根据国产计算机的脆弱性及面临的安全风险,建立了威胁模型并进行逐级分解,形成了具体的攻击路径。在威胁量化阶段,采用模糊层次分析法(FAHP)计算出了攻击路径的概率。在威胁消减阶段,通过部署具体测试环境,利用安全测试方法对模型进行验证,最后给出了威胁消减措施。结果表明,该模型能够识别国产计算机的主要安全威胁,通过安全设计减轻威胁有助于提升信创计算机产品和应用的安全性。 展开更多
关键词 信创 国产计算机 威胁模型 攻击路径 模糊层次分析法
在线阅读 下载PDF
Climate Change and Biodiversity Threats on Pachypodium Species in South Africa
17
作者 Danni Guo Leslie W. Powrie Danielle W. Boyd 《Journal of Geoscience and Environment Protection》 2019年第5期37-44,共8页
The genus Pachypodium are succulent shrubs and small trees found in Southern Africa. Climate change is identified as one the most important threat impacting plant and animal species in the South Africa today, and in t... The genus Pachypodium are succulent shrubs and small trees found in Southern Africa. Climate change is identified as one the most important threat impacting plant and animal species in the South Africa today, and in this case study, we examined the Pachypodium bispinosum and Pachypodium succulentum species in South Africa, which are becoming more vulnerable due to climate change impacts as well as human threats. This study investigates the climate change impacts on the two Pachypodium species, as well as the biodiversity threats facing the Pachypodium species today, and provides evidence regarding the importance of the study to understanding the climate change impacts on the Pachypodium species by showing the underlying variables affecting the changes. 展开更多
关键词 CLIMATE CHANGE BIODIVERSITY threats Pachypodium SPECIES Pachypodium succulentum Pachypodium bispinosum SPECIES modelLING
在线阅读 下载PDF
面向突防的滑翔制导炮弹弹道规划方法
18
作者 尹秋霖 陈琦 +1 位作者 王中原 王庆海 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2024年第10期3151-3161,共11页
针对滑翔制导炮弹在不可避免的威胁区域内选择突防方案的问题,从量化威胁值的角度建立了敌方防御手段的数学模型,基于模型设计了全程综合威胁值最低的规划指标,提出考虑目标防御威胁的弹道规划方法。为实现滑翔制导炮弹全程飞行过程中... 针对滑翔制导炮弹在不可避免的威胁区域内选择突防方案的问题,从量化威胁值的角度建立了敌方防御手段的数学模型,基于模型设计了全程综合威胁值最低的规划指标,提出考虑目标防御威胁的弹道规划方法。为实现滑翔制导炮弹全程飞行过程中初始弹道倾角、偏角、火箭点火时刻、滑翔启控时刻等各参数的最佳匹配,建立了多阶段全弹道规划模型,并采用hp自适应伪谱法将最优控制问题转换为非线性规划问题求解。通过仿真验证了在该指标下滑翔制导炮弹对目标防御的规避效果,分析了影响有效性的因素。与传统弹道规划方法进行对比,证明了所提方法的优越性。 展开更多
关键词 滑翔制导炮弹 突防 威胁建模 全弹道规划 hp自适应伪谱法
在线阅读 下载PDF
基于SIR模型的无线网络安全威胁态势量化评估算法
19
作者 胡斌 马平 +1 位作者 王越 杨浩 《吉林大学学报(信息科学版)》 CAS 2024年第4期710-716,共7页
为确保网络安全,及时掌控安全状况,以易感者、感染者和免疫者(SIR:Susceptible Infected Recovered)模型为基础,面向无线网络提出安全威胁态势量化评估算法。选取资产价值性,系统脆弱性与威胁性作为量化评估指标,分别根据信息资产的安... 为确保网络安全,及时掌控安全状况,以易感者、感染者和免疫者(SIR:Susceptible Infected Recovered)模型为基础,面向无线网络提出安全威胁态势量化评估算法。选取资产价值性,系统脆弱性与威胁性作为量化评估指标,分别根据信息资产的安全属性与主机劣势的Agent检测值,得到价值性量化值与脆弱性量化值。基于病毒的传播特性,改进SIR模型,分析病毒传播特征,获得威胁性量化值。结合3个指标量化值,建立无线网络安全威胁态势的量化评估算法,用所得态势值评估网络安全状况。测试结果表明,该方法评估出的主机与整个无线网络的安全威胁态势值均与期望值高度拟合,且评估时间更短。所提算法具备良好的评估准确性与实时性,能为网络安全状况分析提供有效的数据依据,及时给予管理员可靠的决策支持。 展开更多
关键词 SIR 模型 无线网络 SIR 改进模型 病毒传播特征 安全威胁态势
在线阅读 下载PDF
一种基于威胁模型的安全测试用例生成框架和工具
20
作者 付昌兰 张贺 +1 位作者 李凤龙 匡宏宇 《软件学报》 EI CSCD 北大核心 2024年第10期4573-4603,共31页
近年来,软件系统安全问题正引发越来越多的关注,系统存在的安全威胁容易被攻击者所利用,攻击者通常采用各种攻击技术诸如口令暴力破解、网络钓鱼、SQL注入等对系统进行攻击.威胁建模是一种结构化分析、识别并处理威胁的方法,传统的测试... 近年来,软件系统安全问题正引发越来越多的关注,系统存在的安全威胁容易被攻击者所利用,攻击者通常采用各种攻击技术诸如口令暴力破解、网络钓鱼、SQL注入等对系统进行攻击.威胁建模是一种结构化分析、识别并处理威胁的方法,传统的测试主要集中在测试代码缺陷,处于软件开发后期,不能很好地对接前期威胁建模分析成果以构建安全的软件,业界威胁建模工具缺少进一步生成安全测试的功能.为了应对此问题,提出一种从威胁模型生成安全测试用例的框架,并设计和实现工具原型.为了便于测试,对传统的攻击树模型进行改进,对构建的模型进行规范性检查,从该模型中可以自动生成测试线索.根据攻击节点发生概率对测试线索进行评估,优先检测概率较高的威胁的测试线索.对防御节点进行评估,选择收益性较高的防御方案缓解威胁,以改进系统安全设计.通过为攻击节点设置参数可以将测试线索转换成具体的测试用例.在软件开发早期阶段以威胁建模识别出的威胁作为输入,通过框架和工具可以生成测试,指导后续的安全开发和安全测试设计,将安全技术更好地嵌入到软件设计和开发之中.案例研究部分将该框架和工具运用于极高危风险的安全测试生成,并说明了其有效性. 展开更多
关键词 威胁模型 威胁建模 攻击树模型 测试用例生成 测试线索
在线阅读 下载PDF
上一页 1 2 24 下一页 到第
使用帮助 返回顶部