Font Size: a A A

The Study And Realization Of Secure Network Construction Based On Control Of Insider Threat

Posted on:2017-07-02Degree:MasterType:Thesis
Country:ChinaCandidate:H YiFull Text:PDF
GTID:2428330512459054Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the network information system security domain,the sources of the security risk can be divided into internal threat and external threat.The outside threat is usually considered as the most serious threat of the network information security,such as the intrusion of hackers,the harms of viruses and the interference of worms.In contrast the application shows that the internal threat has done greater harm to the security of information systems,which is one of the main sources of information system security risk.The traditional security protection technology can play an effective role in resisting external intrusion,but not in mitigating internal threat.In this study,focusing on the life cycle of information data in internal network by using level analysis method,the internal threats inherent in the network is analyzed,and the security model of access control and information process is established.The network structure design strategy based on internal threat control is proposed.The main research work and innovations are presented as follows:1)Analysis of internal threat level detection and quantifying the internal threat by establishing a hierarchical model of internal threat control.2)Hierarchical assessing model of internal threat control based on analysis of the users personal traits,access control authority3)the introduction of a security network structure based on internal threat control.The strategy is applied to an experimental system.The application of the security network system in experiments shows the hierarchical analysis method effectively improves the protective ability against the internal threat as to supports the enhancement of network information services.
Keywords/Search Tags:Internal threat, Hierarchical analysis, Safety network, Hierarchical assessing model
PDF Full Text Request
Related items