Font Size: a A A

Research On Key Technologies Of Intelligent Security Defense Resource Management

Posted on:2013-12-15Degree:MasterType:Thesis
Country:ChinaCandidate:Q GuoFull Text:PDF
GTID:2248330395480564Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
In the world today, with the development of IT and the network application in various fields,information security has been a worldwide concerned problem. What’s more, the attackfrequency is higher, and the attack techniques and methods are developing, loss caused bynetwork attack is more serious, and consumption of security defense is larger. Currently, thestructure of the network information system is getting complex, and the various applicationdeployments are becoming widespread; how to carry out network security protectioneconomically and effectively has been a serious problem to be solved. The existing securitydefense software has limitations such as low resource management ability, solid system structure,a lack of self-adapt ability, simple anti-attack function. Thus the demand of network securitydevelopment can’t be satisfied. Explore and exploit of intelligent security defense software willbe an efficient way to solve this problem.This paper introduces the model and principle of an Intelligent Security Defense Software(ISDS), and analyzes the network system configuration. Then, ISDS’s key intelligentmodule—resource management system is deeply researched. A Hierarchical ResourceManagement Framework (HRMF) is designed, and its resource selection and resourcescheduling mechanism are put forward. The detailed work is shown as following:1. In order to improve the ISDS intelligence, combined with characteristics of the systemmodel, the ISDS resource management framework HRMF is designed. The design ofhierarchical structure meet the need of ISDS resources management efficiently; The design ofresource management domain model give an effective solution to the center node performancebottleneck, single location invalidation and other issues in the centralized resource managementmodel, as well as the resource nodes security risks and low resource discovery efficiency in thedistribute resource management model; the design of the resource management model provide aorganic combination of resource management function units to meet ISDS resource managementneeds of different levels, different objectives and different particle size involved in the process ofthe whole network security.2. For there being many unstable resources in the ISDS environment, a new resourceselection method based on multi-objective decision-making is designed. This method caneffectively filter resources with high reliability risk, low credibility and large real-time load.Experiments show that this approach can effectively select the available resource set, improvethe quality of resource scheduling, reduce the failure rate, and optimize resource schedulingcosts. 3. A new resource scheduling algorithm based on the space distance of resource object isdesigned. This algorithm introduces the concept of distance space in functional analysis,mapping the Cost/Performance Ratio vectors in the scheduling process to the reference pointsin high dimensional space in order to match the suitable resource efficiently. The experimentsshow that the algorithm conducts resource scheduling with a balance between performance andcost indicators effectively in a smaller amount of computation, and avoid causing a burden forthe whole system.4. Based on preliminary research, the ISDS resource management system is designed,achieving the resource management model, and analyzing the management effectiveness.
Keywords/Search Tags:intelligent security defense, resource management, resource selection, resourcescheduling
PDF Full Text Request
Related items