Font Size: a A A

Design And Research On Security Evaluation System Based On Host Computer

Posted on:2011-09-23Degree:MasterType:Thesis
Country:ChinaCandidate:S ChenFull Text:PDF
GTID:2178360305990099Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the greatest invention of the 20th Century, The Internet has gone deep into all respects of society and has brought hugely advantage to people's work, study and amusement. But as the development of various hacker techniques and malicious code, network security is presented with a fearful challenge. How to effectively safeguard the information security has been an important research contents in the areas of computers. Security evaluation as an important step of active security defense, it is of significance to discovering in advance and handling on time the host computer's security risk. Security evaluation is also a study hotspot in the field of network security. By evaluation the security of host computer, help users with discover the vulnerability in the host computer on time, and help user understand current safety situation of host computer is the main purpose of this paper.This study, an evaluation system of host computer security risks is trying to collect and analysis the information of vulnerability and threat, then evaluation the current safety situation of operating system by this information. The security factor of host computer includes 11 aspects: Operating System, Important Files, Browser, Web Service, Common Service, Process, Registration Table, Shared Folders, Application Program, Driver, etc. Take the security evaluation of common home computer under the Windows environment as the research object, and research on how to get the security factor, and where it is. This paper used matrix theory, Analytic Hierarchy Process (AHP), fuzzy comprehensive evaluation, etc. to construct the host computer security element system, to quantified security element and the host computer's security situation. Finally the conclusion has been verified through an example.Funded by key scientific and technological project of Henan province, studies have been made on the evaluation of host computer security risks. In this paper, some aspects as below are researched deeply, and some results are obtained.1. For Windows XP determined the information of what affect the Host security situation, and standard these information to security factor. Excavate the source of different security factors information.2. Design the model of hierarchical structure about host security evaluation. The model use for reference of national standard and experts'opinions, adopt three layers tree hierarchies, 36 security factors make up of the bottom-most class, and respectively belong to 11 security aspects, these 11 security aspects belong to the top-most host security.3. To calculate the host computer system security synthetic score, the paper propose the method of combined AHP and the fuzzy synthetic evaluation. The calculation of different security aspects and security factors coefficient weight of Host security level, and the evaluation of Host security level.4. Design the technical scheme of Host security evaluation system, the structure, functions, technical features of Host security evaluation system are described, and in detail the system flow of work.The innovative research work is as below:1. Extended the field of security element, and increasing by security management, security policy, it can help to think over the factors which impact on the security of host with a more comprehensive and informative display.2. After get the weighted value by the method of AHP, this paper use FCE to correct the value of security element by give up part of accuracy, to insure the host's comprehension security situation rationality.
Keywords/Search Tags:Security Evaluation Based Host, Security Factor, Security Element, Analytical Hierarchy Process, Fuzzy Comprehensive Evaluation
PDF Full Text Request
Related items