期刊文献+

基于风险损失量化模型的网络安全应急处置技术研究 被引量:2

Research on network security emergency response technology based on risk loss quantitative model
在线阅读 下载PDF
导出
摘要 针对当前网络安全应急响应处置过程严重依赖人员,以及决策过程缺乏科学量化的计算依据,导致响应缓慢,处置不及时,缺乏针对性等问题,文章提出了一种基于风险损失量化模型的网络安全应急处置策略,并将其落地在实际产品上。目前,这种设计已经在安徽移动企业现网环境应用,并取得了初步的成效。 Human work and decisions are dependent heavily on most processes of Cyber security emergency response.The decision-making process lacks scientific and quantitative calculation basis,resulting in slow response and untimely disposal.Author of this paper gives a new policy which is based on a quantitative calculation model for risk and loss calculation.
作者 韩志峰 郑瑞刚 许暖 Han Zhifeng;Zheng Ruigang;Xu Nuan(China Mobile Information Techology Co.,Ltd.,Beijing 100033;China Mobile Communications Group Anhui Co.,Ltd.,Anhui Hefei 230000)
出处 《网络空间安全》 2020年第12期119-125,共7页 Cyberspace Security
关键词 网络安全 应急处置 应急响应 风险计算 定性计算 定量计算 cyber security emergency response risk calculation qualitative calculation quantitative calculation risk treatment
  • 相关文献

参考文献5

二级参考文献51

  • 1陆余良,夏阳.主机安全量化融合模型研究[J].计算机学报,2005,28(5):914-920. 被引量:29
  • 2王益丰,李涛,胡晓勤,宋程.一种基于人工免疫的网络安全实时风险检测方法[J].电子学报,2005,33(5):945-949. 被引量:30
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 4张永铮,方滨兴,迟悦,云晓春.网络风险评估中网络节点关联性的研究[J].计算机学报,2007,30(2):234-240. 被引量:52
  • 5Howard M, Pincus J, Wing J M. Computer Securing in the 21st Century. Springer, 2005:109-137
  • 6Ortalo R, Deswarte Y, Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 1999, 25 (5) : 633-651
  • 7Ammann P, Wijesekera D, Kaushik S. Scalable, graphbased network vulnerability analysis//Proceedings of the 5th ACM Conference on Computer and Communications Security. Washington DC, USA, 2002:217-224
  • 8Gehani A, Kedem G. Rheostat: Real-time risk management//Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection. French Riviera, France, 2004:296-314
  • 9Jonsson E, Olovsson T. An empirical model of the security intrusion process//Proceedings of the 11th Annual Conference on Computer Assurance. Gaithersburg, 1996:176-186
  • 10Jonsson E, Olovsson T. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering, 1997, 23(4): 235-245

共引文献131

同被引文献11

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部