Optimal Integration Model of Multiple Information Security Methods

作者: Bin Zeng , FuLiang Guo , Lu Yao

DOI: 10.1109/MUE.2009.91

关键词:

摘要: With the ever growing number of hosts connected to Internet, network and information security has become more important. Due increasing sophistication attacking techniques automated tools, it is necessary for large scale combine multiple heterogeneous mechanisms’ collaboration discover defend various distributed coordinated attacks. In order allow a Integration existing technologies, fusing multi-defense technology optimization model proposed, which takes into account not only aspect but also its impact on performance, usability, cost. The relative preference among objectives can be adjusted by varying weights associated with each parameter mathematic model. illustrated confirmed applying typical example problem in sharing field. This method improve scalability, accuracy capability adopting multi defense technology.

参考文章(7)
Andreas Hess, Michael Jung, Günter Schäfer, Combining Multiple Intrusion Detection and Response Technologies in an Active Networking Based Architecture DFN-Arbeitstagung über Kommunikationsnetze. pp. 153- 165 ,(2003)
Marianne Swanson, Security Self-Assessment Guide for Information Technology Systems National Institute of Standards and Technology (U.S.). ,(2001) , 10.6028/NIST.SP.800-26
J.O. Kephart, D.M. Chess, The vision of autonomic computing IEEE Computer. ,vol. 36, pp. 41- 50 ,(2003) , 10.1109/MC.2003.1160055
Sandip C. Patel, James H. Graham, Patricia A.S. Ralston, Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements International Journal of Information Management. ,vol. 28, pp. 483- 491 ,(2008) , 10.1016/J.IJINFOMGT.2008.01.009
Gregory A. Lamm, Yacov Y. Haimes, Assessing and managing risks to information assurance: A methodological approach Systems Engineering. ,vol. 5, pp. 286- 314 ,(2002) , 10.1002/SYS.10030
Gary Stoneburner, Alice Goguen, Alexis Feringa, Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology / AHIMA, American Health Information Management Association. ,(2002) , 10.6028/NIST.SP.800-30
Liu Lian-chen, Intrusion detection system model based on multi detection technology Computer Engineering and Design. ,(2008)