首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 62 毫秒
1.
本文在研究了网络安全的国内外有关情况后对网络安全技术进行了探讨 ,介绍了一种简单而实用的网络安全产品 ,添补了这方面的空白 ,而且本文介绍的产品已经应用到了许多部门 ,为网络安全做出了贡献  相似文献   

2.
针对网络安全评估存在的不确定性,提出了一种新的基于区间层次分析法的网络安全评估方法.首先建立了多层次的网络安全评估指标体系,然后利用区间层次分析法确定了网络安全评估指标的区间数权重.在此基础上,结合区间数理论建立了基于区间层次分析法的网络安全评估模型.最后结合评估实例对某公司办公自动化网络进行了安全评估,验证了方法的可行性和有效性.  相似文献   

3.
互联网上每天充斥着大量入侵与攻击事件,已经严重威胁到网络安全,如何把握网络目前安全态势并预测其发展趋势已成为国内外网络应急响应的热点研究内容之一.根据网络安全事件发生的统计规律性,分别研究了基于时间序列的神经网络和灰色系统理论对未来一段时间内的安全事件数量进行预测的方法,并在此基础上对未来的安全态势进行评估,从而得知网络的整体安全运行状况,有效指导了管理员对网络安全的控制.  相似文献   

4.
网络安全是网络空间安全的一个重要研究领域,网络安全协议则是实现网络安全的核心技术.在2017年最新发布的TLS1.3协议是实现网络安全的一个关键传输层安全协议,因此其安全性受到了人们的广泛关注.为了验证TLS1.3协议的安全性,尤其是秘密性和认证性,尝试基于符号模型,首先基于Applied PI演算对TLS1.3协议进行形式化建模,进而使用非单射性建模认证性,然后将针对TLS1.3协议的Applied PI演算模型转换为安全协议分析工具ProVerif的输入,应用ProVerif对其进行形式化分析,实验结果表明TLS 1.3协议具有良好的认证性和机密性.  相似文献   

5.
全球网络威胁日趋严峻,作为网络安全事件产生的根源之一,网络安全漏洞越来越被重视,对漏洞的披露已是国家网络安全应急体系建设的重要内容之一。本文构建了网络安全漏洞共享平台、软件厂商及黑客之间的三方博弈模型,并从演化博弈角度对模型进行了分析和数值模拟,确立了稳定均衡点存在的条件。研究结果表明:不同参数初始值对三方博弈结果存在显著差异,软件质量越差,平台越倾向于“封闭披露”策略;对漏洞发现者的支付积极影响软件厂商“注册会员”倾向,对黑客的“努力攻击”倾向产生负面影响;随披露成本的上升,平台更倾向于采纳“封闭披露”策略;预期损失过大,软件厂商倾向于“注册会员”策略。  相似文献   

6.
在滑动式验证码完成滑动验证的过程中,正确区分出操作者是“机器”还是“个人”对于网络安全至关重要.本文利用人和机器完成验证所留下的滑动轨迹提取特征,运用机器学习中的神经网络算法和MATLAB软件对其进行实证研究和分析,建立神经网络分类模型预测验证操作者的类别.结果表明,BP神经网络模型预测准确度很高,在一定程度上为网络安全提供了保障.  相似文献   

7.
以低碳和普通产品两个制造商和一个零售商组成的两级供应链系统为研究对象,探讨了供应链的差异化定价与协调机制问题。求解得到了两制造商和零售商的最优定价策略及可行的低碳产品生产成本范围。研究发现:1)分散决策的差异化定价策略无法达到供应链协调;2)在可行的低碳产品生产成本范围内,低碳产品制造商、零售商和整个供应链系统的利润都随低碳产品生产成本的增加而减少,只有普通产品制造商的利润随低碳产品生产成本的增加而增加。因此,降低低碳产品生产成本是促进低碳产品推广的关键。针对分散决策造成供应链效率损失的情况,采用Shapley值法进行协调,并给出了契约协调机制。最后,通过算例分析了消费者价格敏感性变化和低碳产品生产成本上升对最优决策和供应链利润的影响。  相似文献   

8.
通过引入一类企业的有效创新贡献水平函数,应用三阶段博弈模型分析了创新溢出内生时双寡头企业的产品定位和定价决策问题.研究发现,双寡头企业产品的均衡定位是功能非替代率的增函数;企业间的产品差异随功能非替代率的增大而增加,内生溢出却随之增大而减小;如果从两企业均衡定位处稍微减小它们之间的差异程度,则产业利润将减少,而社会福利是否减小与单位产品的功能非替代率的取值有关.  相似文献   

9.
再制造产品的出现,引出了销售渠道决策的新问题。基于博弈理论,分析比较新制造产品和再制造产品五种渠道结构,得到了五种结构下新制造产品和再制造产品均衡产量和零售价格,以及制造商和零售商的均衡利润。研究结果表明,一般情况下,制造商可以凭借零售商之间的竞争提升自身在供应链的权重,使自己获利。然而当制造商通过两个零售商分开销售新制造产品和再制造产品时,制造商并不能因此而增加自己的利润。对于零售商而言,双边垄断使零售商地位提升,而新制造产品或者再制造产品分开销售都会伤及零售商。数值结果表明,零售商之间的竞争缓和了供应链上下游的双重边际效应,增加了供应链的总利润,同时也提高消费者剩余和社会福利。  相似文献   

10.
本文在消费者需求受价格和产品绿色度影响的背景下,考虑制造商通过提高产品绿色度来扩大需求的情况以及双渠道需求之间的搭便车效应,构建了集中式和分散式博弈模型,并设计了收益共享和成本共担的联合契约协调供应链。研究发现:直销渠道价格和传统渠道价格都会随着产品绿色度的提高而上升,其中直销渠道价格的上升幅度随着搭便车消费者比例的增大而下降,传统渠道价格的上升幅度随着搭便车消费者比例的增大而加快;联合契约的引入能有效地降低直销渠道价格和传统渠道价格,提高产品绿色度和供应链总需求,使供应链总利润达到集中决策时的水平。  相似文献   

11.
为了提高电子支付系统的安全性,在深入研究面向服务架构和Web服务安全技术的基础上,提出一种基于Web服务面向服务架构的松耦合电子支付安全系统模型.该模型利用服务监控和企业服务总线,把交易协议、安全认证、安全技术、加密技术、访问控制、网络扫描、防火墙、内容识别等安全服务有效的集成为一体,构建出电子支付的安全模型,同时对模型的关键安全服务技术进行深入研究.最后对模型的机密性、公平性、完整性、授权等进行了安全性分析,证明提出的系统模型具有良好的安全性.  相似文献   

12.
Programmable logic controllers (PLCs) are important components of industrial control systems (ICSs), which are digital electronic devices with microprocessors and lack network security considerations. With the explosion of cyber-attacks on the ICS network, the concept of the worm known as PLC-PC worm that can spread between the Internet and ICS network has attracted a great deal of attention. In this paper, for the first time, we propose a propagation model to explore the spread behavior of PLC-PC worms across the PLC-PC coupled network. Theoretical analysis of the model shows the disease-free and endemic equilibriums of the network with defensive measures. And the stability of the model is examined by an epidemic threshold value. Several numerical and simulation experiments are presented to illustrate the analysis. Based on the results, some ideas for restraining the spread of PLC-PC worms or reducing the security threats of the ICS network are suggested.  相似文献   

13.
The study of the security and stability of complex networks plays a central role in reducing the risk and consequences of attacks or disfunctions of any type. The concept of vulnerability helps to measure the response of complex networks subjected to attacks on vertices and edges and it allows to spot the critical component of a network in order to improve its security. We introduce an accurate and computable definition of network vulnerability which is directly connected with its topology and we analyze its basic properties. We discuss the relationship of the vulnerability with other parameters of the network and we illustrate this with some examples.  相似文献   

14.
The application of Internet of Things promotes the cooperation among firms, and it also introduces some information security issues. Due to the vulnerability of the communication network, firms need to invest in information security technologies to protect their confidential information. In this paper, considering the multiple-step propagation of a security breach in a fully connected network, an information security investment game among n firms is investigated. We make meticulous theoretic and experimental analyses on both the Nash equilibrium solution and the optimal solution. The results show that a larger network size (n) or a larger one-step propagation probability (q) has a negative effect on the Nash equilibrium investment. The optimal investment does not necessarily increase in n or q, and its variation trend depends on the concrete conditions. A compensation mechanism is proposed to encourage firms to coordinate their strategies and invest a higher amount equal to the optimal investment when they make decisions individually. At last, our model is extended by considering another direct breach probability function and another network structure, respectively. We find that a higher connection density of the network will result in a greater expected cost for each firm.  相似文献   

15.
The term network surveillance is defined in general terms and illustrated with many examples. Statistical methodologies that can be used as tools for network surveillance are discussed. Details for 3 illustrative examples that address network security, surveillance for data network failures, and surveillance of email traffic flows are presented. Some open areas of research are identified.  相似文献   

16.
This paper discusses and extends some competitive aspects of the games proposed in an earlier work, where a robust railway network design problem was proposed as a non-cooperative zero-sum game in normal form between a designer/operator and an attacker. Due to the importance of the order of play and the information available to the players at the moment of their decisions, we here extend those previous models by proposing a formulation of this situation as a dynamic game. Besides, we propose a new mathematical programming model that optimizes both the network design and the allocation of security resources over the network. The paper also proposes a model to distribute security resources over an already existing railway network in order to minimize the negative effects of an intentional attack. For the sake of readability, all concepts are introduced with the help of an illustrative example.  相似文献   

17.
This paper presents the problem of scheduling security teams to patrol a mass rapid transit rail network of a large urban city. The main objective of patrol scheduling is to deploy security teams to stations of the network at varying time periods subject to rostering as well as security-related constraints. We present several mathematical programming models for different variants of this problem. To generate randomized schedules on a regular basis, we propose injecting randomness by varying the start time and break time for each team as well as varying the visit frequency and visit time for each station according to their reported vulnerability. Finally, we present results for the case of Singapore mass rapid transit rail network and synthetic instances.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号