Font Size: a A A

Research On Security Assessment Key Techniques Of Distributed Host

Posted on:2012-12-06Degree:MasterType:Thesis
Country:ChinaCandidate:J W LiFull Text:PDF
GTID:2178330332986525Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The network has brought hugely advantage to people's life, work and study, while the network exist a variety of risk, and it is a double edged-sword. As the development the Internet, its openness, sharing and Internet level is more and more large, also the importance of the network and influence on the society is more and more large, and network security issues are becoming increasingly prominent. Safety assessment is a basic work to establish network protection system, by reasonable assessment to prevent network security incident is the purpose of safety assessment.This paper studies security assessment technique of distributed host in-depth and designs security assessment system of distributed host based on the background of enterprise network. The research on security assessment technique of distributed host can provide a comprehensive accurate understanding to network security risk for enterprise network administrator, helping to improve host user and enterprise network administrator safety awareness, and offer the scientific decision-making bases for the enterprise network security, reducing the probability of network security incident.This paper studies three key technologies related to the security assessment of distributed host. First, the paper designs a communication protocol related to the security assessment of distributed host, the design and implementation of communication protocol ensure communication controllability, security and sustainability, then the paper proposes a communication model with visual and controllable base on order-driven. In order to reduce communication pressure of control centre in the security assessment system of distributed host, a new task communication dispatch model is proposed in this paper, called the model of dynamic designate communication and dispatch, that each subnet is a group, only existing a direct connection between control centre and group leader, the task which the control centre has distributed should be distributed to group members once again by the group leader, and the multicast communication is used among the group members.Second, this paper proposes a hierarchical assessment model, the uncertainty theory of the cloud is applied to security assessment of distributed host, efficiently solving the uncertainty in assessment knowledge representation, adequately combining qualitative assessment with quantitative assessment, and achieving the uncertainty conversion between qualitative concept and quantitative data. For each subnet, the assessment score of the host as cloud droplet, evaluating the entire network safe condition through the backward cloud algorithm, finally the conclusion has been verified through an example.
Keywords/Search Tags:Distributed Security Assessment, Communication Protocol, Task Dispatch, Model of Cloud, Uncertainty, Backward Cloud
PDF Full Text Request
Related items