Font Size: a A A

Research On The Methods For Combined Strength Of Network Security Components Composition

Posted on:2010-06-11Degree:MasterType:Thesis
Country:ChinaCandidate:S D LiFull Text:PDF
GTID:2178360278980831Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
The problem of combined security strength of components composition, mainly analyze the influence of components distribution, components interaction, components function implement to information system, it is also the problem must be faced and solved of information system security evaluation. Research on combined security strength of components composition is developing well nowadays, but, does not come into uniform course explanation or instructed frame. Through analyzing the characteristic of components composition and the course of components evaluation, this dissertation research on how to establish the frame of combined security strength of components composition, then research on the problem of components evaluation sequence and combined security strength of components composition.Firstly, the frame of combined security strength of components composition is established: with the target of ensuring the clearness and criterion of combined security strength of components composition, research on the course and the core problems of components evaluation, establish the whole frame of combined security strength of components composition.Secondly, focus on the weakness of existed methods of components evaluation sequence, based on components relation graph, analyze the problem of components evaluation sequence, base on this method, the method of components evaluation sequence based on Petri net reachable tree introduced. But, reachable tree is difficult to create when the scale of network is huge, then Petri net simulation method proposed.Finally, discuss the characteristic of components relation, analyze the existing methods of combined security strength of components composition, introduce a new method based on Petri net, and discuss how to model the real network, through Petri net simulation validates the rationality and feasibility of the method.
Keywords/Search Tags:Security Component, Combined Security Strength, Petri Net, Components Evaluation Sequence
PDF Full Text Request
Related items