Research and Analysis on Network Security Modeling

被引:0
作者
Cao, Kehao [1 ]
机构
[1] Henan Finance & Taxat Coll, Gongyi, Henan, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2016年 / 10卷 / 04期
关键词
Safety network platform; Relationship modeling; Network security;
D O I
10.14257/ijsia.2016.10.4.14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of Internet and mobile Internet, Internet of things, will promote the wide application of the Industrial Internet and other vertical Internet. Smart device manufacturing, smart Internet marketing will give people work and life led to profound changes and the experience. But all walks of network security problems will become increasingly serious. Traditional networks of a variety of viruses, hackers and other threats will expand the network to the new system, they caused the damage and the impact will be more dangerous and grim. Security Analysis researching work needs to extract network and system resources related to security as well as the security factors, so as to establish a security modeling for security analysis. In this paper; it takes the introduction of network security property as a cutting point, combined with the safety requirements and analysis on the level of safety requirements, discussing the structure of safety network platform as well as the main connection relationship modeling.
引用
收藏
页码:135 / 142
页数:8
相关论文
共 10 条
[1]  
[Anonymous], 2013, XINHUA NET, V03
[2]  
Peng Z, 2011, J INFORM NETWORK SEC, V7, P84
[3]  
Phillips C, 1999, NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, P71
[4]  
Ramakrishnan C. R., 2002, Journal of Computer Security, V10, P189
[5]   Representing TCP/IP connectivity for topological analysis of network security [J].
Ritchey, R ;
O'Berry, B ;
Noel, S .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :25-31
[6]  
Shuxian L, 2010, ANAL INFORM SECURITY, V5
[7]  
Swiler L. P., 2000, P DARPA INF SURV C E, P307
[8]  
Yan C, 2013, SNOWDEN EXPOSURE US, V8
[9]  
Yong Z, 2012, SOHU IT, V11
[10]  
ZHANG Y Z, 2004, 2004 6 INT C ENT INF, P596