Font Size: a A A

Research On The Control Mechanism Of Military Software Development Platform Insider Threat

Posted on:2015-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:T X ZhuFull Text:PDF
GTID:2322330518972082Subject:Navigation, guidance and control
Abstract/Summary:PDF Full Text Request
With the informatization and intelligent constantly reinforce, with the scale and complexity sustained growth, the requirements for weapon equipment system's reliability and safety are increasing, then we put forward the higher request to the environment of system hardware and software development, especially in our country has not yet formed the high ideas and knowledge of the quality of hardware and software system development and lack of all-round quality assurance from technology to management mechanism and perfect method,especially in terms of safety, the development of IT technology promoted the proliferation of information and the complex and diverse of information source, which make weapons and equipment system development's environment exists immeasurable safety factor, the development stage of unsafe hidden trouble will accompany the product whole life cycle and the loss will be immeasurable. Therefore, the establishment of security software development platform, and guarantee the safe and reliable of the development process, which is very important to development a safe environment in the entire life cycle of software system .Weapons and equipment abeiyere include a lot has been completed or developing software information in the software development platform, to prevent leakage of this information,the most important thing is to solve the problem of insider threats. Through statistical analysis of all kinds of safety problems, we found that the insider threat has become a major problem affecting the safety of a development platform. The academic have a muti-angle in-depth research for the hot issue. But at home,insider threat also is a blank.The starting point of this paper is to slove the insider threat in the military software development platform, study deep the insider threat, incluing the content analysis, origin,classification, the modeling analysis methods, and study the currently most widely used information security architecture in detail.The first research target of this paper sets up an insider threat security defense framework, this framework is a multidimensional and layered structure which the middle is a safety line to strengthen the circulation of information. It considers all levels of the content from legal, risk management, acceptable use, continuous monitoring, incident response,technical six dimensions. It defend the internal threats in the whole through the middle of the security line which transfer layers of security information to each other, strengthen the circulation of all levels and departments.And then studied another big hidden trouble on military software development platform is the data leakage in USB mass storage device. By studying the attribute of USB storage devices and role-based access control model, the paper puts the ideas of role-based access control into the use of the USB storage device. It also puts forward a new solution to USB storage device data leakage which is applied in a Linux system.Finally,in order to solve the problem of identifying slow attackers,the article simplifies organize's network system, using the idea of accumulating evidence to improve Bayesian algorithm,through real-time updating on the Bayesian factor and obtaining a score for each node, designes Bayesian algorithm based on updating evidences. Through simulation experiments, the results show that the algorithm can effectively identify the insider threats of slow attack.
Keywords/Search Tags:Military software development, Insider threat architecture, USB storage leakage, Improved Bayesian algorithm
PDF Full Text Request
Related items