用户名: 密码: 验证码:
任务关键系统生存性形式化建模与分析
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息化时代的到来,各类任务关键系统得到了广泛的应用,这些系统提供的基本服务一旦中断将给国民经济和人民生活带来巨大的影响。传统安全措施虽然提高了系统的安全性,但各种入侵事件还是不断发生,为此必须考虑系统在入侵发生后仍能提供用户满意的服务,生存性是应对一切攻击、入侵和破坏的最佳途径。
     生存性研究的焦点在于保证系统在遭受攻击、故障和意外事故后仍能及时完成其关键任务,研究涉及生存性设计和生存性分析两大领域。其中,生存性分析,特别是量化分析是一项重要的基础工作,着重研究如何评价系统的生存性。目标是提供一个标准的测评方案,对系统生存性的现状进行评估,对生存性的变化趋势进行预测,进而在理论上指导可生存系统的设计和实现。目前,生存性分析研究虽然取得了一些进展,但整体上还没有形成统一的分析规范,研究成果也较少考虑到在实际应用中的可行性。本文针对这种情况,以生存性分析问题为核心,对系统生存性建模及分析方法进行深入研究。
     首先,研究基于复合属性的生存性指标体系模型。从指标内容、攻击阶段及测定标准三个不同侧面对生存性性能指标进行综合分析,提出一种系统反映生存性的指标体系,对其进行形式化描述并抽象出相应的数学模型。在此基础上,探讨指标体系在不同应用场景下的简化与扩展,结合实例说明指标体系在不确定型AHP-Fuzzy生存性评估方法中的具体使用,为系统生存性分析提供合理的依据。
     其次,研究基于性能评估进程代数的系统生存性形式化建模方法。剖析影响生存性的本质特征,将服务请求与服务器、攻击者与服务器描述为不同的组件,从用户服务请求和攻击影响两个角度分别构建精确描述系统行为和性质的生存性模型,并比较两种建模角度的异同。对模型中参数的灵敏度进行分析,使构建的模型更加完善。性能分析结果表明,该模型能够正确地反映出系统生存性的关键属性,以此为基础实现具体的生存性分析。
     再次,研究基于概率模型检测的系统生存性量化分析方法。将图理论分析与数值求解、统计、仿真等技术相结合,面向具有随机行为的连续时间马尔可夫链系统概率模型,针对不同程度的攻击故障及系统服务水平,使用连续随机逻辑建立生存性的形式化规约。借助概率模型检测工具PRISM对模型进行统计和分析,以图形化地形式表示出系统生存性自动分析结果。仿真试验结果验证了该方法在生存性量化分析中的合理性和有效性,可实现系统在不同环境下生存性的实时监控。
     最后,研究基于序列蒙特卡罗的系统生存性预测方法。建立系统动态模型并获取系统在当前时刻生存性的先验PDF,然后在当前时刻观测值和观测似然模型的基础上,根据贝叶斯公式更新先验PDF。通过重采样,用加权样本组合逼近生存性的真实后验概率分布,实现对下一时刻系统生存性的预测。仿真试验结果表明SMC对于生存性具有较高的预测精度,从多个时间序列中展示出系统生存性的动态变化趋势,使面向生存性的管理从被动变为主动。
With the advent of information age, various mission-critical systems have been widely used, and once the basic services interrupt, an enormous impact will be imposed on the national economy and people' s living standards. Traditional security measures have improved system security, whereas kinds of invasions still occur. As a result, the ability of system to provide users with satisfied services after invasions must be taken into account. Survivability is the best way to deal with all attacks, incursions and destructions.
     Research on survivability focuses on how to ensure that systems can complete their critical missions in time under attacks, accidents or failures. Two domains are involved in this research: design and analysis of survivability. Among them, survivability analysis, especially the quantitative analysis is an important and fundamental work, focusing on how to assess system survivability. The objective is to provide a normal evaluating scheme, which can assess the current status of system survivability, forecast survivability' s trend in various environments, and further direct the design and realization of survivable system basically. At present, researches on survivability have made some progress, but there is still no uniform analyzing criterion and the research achievements have not taken practical feasibility into account. Aiming at this, survivability analysis is taken as the core, and the modeling and analyzing methods for system survivability are studied deeply in this dissertation.
     Firstly, index system model of survivability based on composite attribute is studied. Performance metrics of survivability are comprehensively summarized from the following three perspectives: index content, attack phases and evaluating standard. Then a framework for index system which can present survivability is proposed and formalized, furtherly the corresponding mathematical model are abstracted. On the basis, simplification and extension of the index system in various application backgrounds are discussed. Combined with an instance, index system is illuminated in uncertain AHP-Fuzzy survivability evaluation, which provides reasonable evidence for system survivability analysis.
     Secondly, formal modeling method of system survivability based on performance evaluation process algebra is studied. By analyzing the essential characters affecting survivability, service request and server, intruder and server are described as different components. Namely survivability model which accurately depicts system behaviors and properties is constructed from perspectives of users' service requests and attack impact respectively, and then similarities and differences are compared. Sensitivity analysis for model parameters is performed to make the constructed model perfect. Performance analysis resuluts show that the model can reflect key attributes of system survivability exactly, on the basis of which to achieve specific survivability analysis.
     Thirdly, quantitative analysis method of system survivability based on probabilistic model checking is studied. Graph theory analysis is combined with numerical solution, statistics and simulation technology. Oriented at the CTMC system probabilistic model with stochastic actions, then formal specification of survivability is identified by continuous stochastic logic according to different disasters degree and service levels. Ultimately, Prism, the probabilistic model checking tool, is used to do statistics and analysis, and automated analysis results are plotted as graphs. Simulation experiment results verify the reasonability and validity of this method in quantitative analysis for survivability, which helps to realize the real-time monitoring for system survivability under different environments.
     Finally, forecasting method of system survivability based on Sequential Monte Carlo is studied. A dynamic model of system is founded and employed to acquire prior PDF of survivability at current time, and then Bayesian formula is used to update the prior PDF on the basis of observed data and measurement model. Samples with associated weights are used to approximate posterior probability density distribution of survivability in order to forecast survivability at the next moment. Simulation experiment results show that SMC has a higher forecasting precision, and exibit dynamic development trend of system survivability from several time sequences, which changes survivability management from passiveness to initiative.
引文
[1]CERT/CC.CERT/CC Overview Incident and Vulnerability Trends.http://www,cert.org/present/cert-overview-trends,2003
    [2]CERT/CC.CERT/CC Statistics 1988-2003.http://www,cert.org/stats/cert_stats,html,2004
    [3]Westmark V R.A definition for information system survivability.Proceedings of the 37th Hawaii Internal Conference on System Sciences.Big Island,Hawaii,USA,2004:2086-2096P
    [4]Pentti T.Survey of the survivability of IT systems.Proceedings of the 9th Nordic Workshop on Secure IT Systems.Helsinki University of Technology,Finland,2004
    [5]Avizienis A,laprie J C,Randell B.Basic concepts and taxonomy of dependable and secure computing.IEEE Transactions on Dependable and Secure Computing,2004,1(1):11-33P
    [6]Ayari N,Barbaron D,hefevre L,Primer P.Fault tolerance for highly available internet services:concepts,approaches,and issues.Communications Surveys &Tutorials,2008,10(2):34-46P
    [7]Ryu D,Chang S.Novel concepts for reliability technology.Microelectronics and Reliability,2005,45(3-4):611-622P
    [8]Menasce D i.QoS issues in web services.Internet Computing,2002,6(6):72-75P
    [9]范红,冯登国,吴亚非.信息安全风险评估方法与应用.北京:清华大学出版社.2006:1-3页
    [10]Jiang T Z.A New definition of Survivability of Communication Networks.Military Communications Conference:Military Communication in a Changing World.McLean,VA,USA,1991:2007-2012P
    [11]Ball R E.The Fundamentals of Aircraft Combat Survivability Analysis and Design.USA:American Institute of Aeronautics and Astronautics,1985
    [12]Moitra S D,Oki E,Yamanaka N.Some new survivability measure for network analysis and design.IEICE Transactions on Communications,1997,E80-B(4):625-631P
    [13]T1A1.2 Working Group,http://www.tl.org/tlal/_a12-hom.htm
    [14]Kawamura R,Ohta H.Architectures for ATM network survivability and their field deployment.Communications Magazine,1999,37(8):88-94P
    [15]Shenai R,Sivalingam K.Hybrid survivability approaches for optical WDM mesh networks.Journal of Lightwave Technology,2005,23(10):3046-3055P
    [16]Rani S,Sharma A K,Singh P.Resource allocation strategies for survivability in WDM optical networks.Optical Fiber Technology,2007,13(3):202-208P
    [17]Barnes A,Hollway A,Neumann P G.Survivable computer-communication systems:the problem and working group recommendations.Technical report,Washington:US Army Research Laboratory,1993
    [18]Ellison R J,Fisher D A,Linger R C,Lipson H F.Survivable network systems:an emerging discipline.Technical report,Pittsburgh:Carnegie Mellon University,1997
    [19]Ellison R J,Linger RC,Longstaff T,Mead N R.Survivable network system analysis:a case study.IEEE Software,1999,16(4):70-77P
    [20]Information Survivability Workshops,http://www.cert.org/ research/isw.html
    [21]Organically Assured and Survivable Information System.http://www.tolerantsystems.org/oasis.html
    [22]Ellison R J,Fisher D A,Linger R C,Lipson H F.Survivability: protecting your critical systems.Internet Computing,1999,3(6):55-63P
    [23]SOS Research Group.http://www,sosresearch,org
    [24]Survivability and High-assurance Assessments Research Program.http://www.sdl.sri.com/programs/
    [25]Active Trust Management for Adaptive Survivable Systems.http://www,ai.mit.edu/projects/its/
    [26]University of Massachusetts Amherst,Survivability Project.http://dis,cs.umass,edu/research/
    [27]Knight J C,Heimbigner D,Wolf A,Carzaniga A.The willow architecture:comprehensive survivability for large-scale distributed applications.Proceedings of the International Conference on Dependable Systems and Networks Intrusion Tolerance Workshop.Washington DC,USA,2002
    [28]Knight J C,Parikh S M.Simulation technology for free flight system performance and survivabi]ity analysis.Proceedings of the 21st Digital Avionics Systems Conference.Irvine,CA,2002
    [29]Lann GL.Predictability in critical systems.Proceedings of the 5th International Symposium on Formal Techniques in Real-Time and Fault-Tolerant Systems.London,UK:Springer-Verlag,1998:315-338P
    [30]Lann G L.Proof-based system engineering and embedded systems.Lecture Notes on Embedded Systems,European Educational Forum,School on Embedded Systems.London,UK:Springer-Verlag,1998:208-248P
    [31]Malicious and accidental-fault tolerance for internet applications.IST Research Project IST-1999-11583.http://www.maftia,org
    [32]赵季红,李增智.一种基于故障的ATM over SDH网的生存性机制.小型微型计算机系统.2003,24(2):119-194页
    [33]史国炜,曹烈光.SDH接入网的网络生存性研究.清华大学学报:自然科学版.2003,43(9):1269-1271页
    [34]黄遵国,卢锡城,王怀民.可生存性技术及其实现框架研究.国防科学技术大学学报.2002,24(5):29-32页
    [35]黄遵国,卢锡城,胡华平.生存能力技术及其实现案例研究.通信学报.2004,25(7):137-145页
    [36]张玉清,张鸿志.可生存性及紧急算法分析.通信学报.2005,26(B01):124-128页
    [37]郭渊博,马建峰.分布式系统中服务可生存性的定量分析.同济大学学报.2002,30(10):1190-1193页
    [38]林雪纲,许榕生.信息系统生存性分析模型研究.通信学报.2006,27(2):153-159页
    [39]王树鹏,云晓春,余翔湛.系统生存性增强技术研究.哈尔滨工业大学学报.2007,39(3):452-456页
    [40]张永,方滨兴,叶建伟,田志宏,包秀国.时间同步网的可生存性增强.计算机研究与发展.2006,43(9):1550-1556页
    [41]王红艳,谢小权.网络系统的生存性机制.信息网络安全.2003,(11):25-28页
    [42]王红艳,刘向东.网络系统生存性分析研究.科技导报.2005,23(4):7-9页
    [43]郑吉平,秦小麟,钟勇等.基于SPN模型的可生存性DBMS中恶意事务修复算法的研究.计算机学报.2006,29(8):1480-1486页
    [44]Knight J C,Strunk E A,Sullivan K J.Towards a rigorous definition of information system survivability.Proceedings of the 3rd DARPA Information Survivability Conference and Exposition.Washington DC,USA,2003,1:78-89P
    [45]Mead N R,Ellison R J,Linger R C.Survivable Network Analysis Method.Technical report,http://www.cert,org/archive/pdf/OOtrO13.pdf,2000
    [46]Casey F,Chert Y L,Wang X Y.Survivability analysis of distributed systems using attack tree methodology.Proceeding of IEEE Military Communications Conference.Atlantic City,New Jersey,2005:583-589P
    [47]Li B,Biswas S,Ortiz A,Ferrese F,Dalessandro D,Qing D.Survivability analysis of reconfigurable systems.Proceedings of 2007 IEEE International Conference on Industrial Engineeringand Engineering Management.Singapore,2007:663-667P
    [48]Liu P.Research Directions in Survivable Systems and Networks.http://www.is.ac.cn/pliu-talk-beijing-2.ppt,2004
    [49]Hiltunen M A,Schlichting R D,Ugarte C A.Enhancing survivability of security services using redundancy.Proceedings of the International Conference on Dependable Systems and Networks.Goteborg,Sweden,2001:173-182P
    [50]Park J,Chandramohan P.Static vs.Dynamic recovery models for survivable distributed systems.Proceedings of the 37th Hawaii International Conference on System Sciences.Big Island,Hawaii,2004:1-9P
    [51]Park S,Song J,Kim B.A survivability strategy in mobile networks.IEEE Transactions on Vehicular Technology,2006,55(1):328-340P
    [52]Knight J C,Strunk E A.Achieving Critical System Survivability through Software Architectures.Architecting dependable systems,2004,3069:51-78P
    [53]Liu P.Architectures for Intrusion Tolerant Database Systems.Proceedings of the 18th Annual Computer Security Applications Conference.Las Vegas,NV,USA,2002:311-320P
    [54]Neumann P G.Practical architectures for survivable systems and networks (Phase-two final report),http://www.csl.sri.com/ neumann/survivability.pdf,2002
    [55]Chong J,Pal P,Atigetchi M,Rubel P,Webber F.Survivability architecture of a mission critical system:the DPASA example.Proceedings of the 21st Annual Computer Security Applications Conference.Tucson,AZ,USA,2005:495-504P
    [56]Howard F.Survivability analysis of command and control communication network part.IEEE Transactions on Communications,1974,22(5):589-605P
    [57]Hakki C,Cankaya S.Improved survivability analysis for SONET SHR.Computer Networks,1999,31 (23-24):2505-2528P
    [58]Chen D,Garg S.Network survivability performance evaluation:a quantitative approach with applications in wireless Ad-hoc networks.Proceedings of the 7th International Workshop on Modeling,Analysis and Simulation of Wireless and Mobile Systems.Venice,Italy,2002:61-68P
    [59]Chen D,Garg S,Trivedi K S.Network survivability performance evaluation:quantitative approach with applications in wireless ad-hoc networks.Proceedings of the 5th ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems.Atlanta,Georgia,USA,2002:61-68P
    [60]Awerbuch B,Curtmola R,Holmer D,Rubens H.On the survivability of routing protocols in ad hoc wireless networks.Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks.Athens,Greece,2005:327-338P
    [61]Gao Z X,Ong C H,Tan W K.Survivability assessment:modeling dependencies in information systems.Proceedings of the 4th IEEE/CMU/SEI Information Survivability Workshop.Vancouver,Canada,2001
    [62]Hevner A,Linger R,Sobel A,Walton G.The flow-service-quality framework:unified engineering for large-scale,adaptive systems.Proceedings of the 35th Annual Hawaii International Conierence on System Sciences.Hawaii,USA,ZOUZ:4006-4015p
    [63]Jha S K,Wing J M,Linger R C,Longstaff T.Survivability analysis of network specifications.Proceedings of International Conference on Dependable Systems and Networks.New York,USA,2000:613-622P
    [64]Dong S K,Khaja M S,gong S P.A framework of survivability model for wireless sensor network.Proceedings of the ist International Conference on Availability,Reliability and Security.Vienna,Austria,2006:515-522P
    [65]Louca S,Pitsillides A,Samaras G.On network survivability algorithms based on trellis graph transformations.Proceedings of the 4th IEEE Symposium on Computers and Communications.Red Sea,Egypt,1999:235-243P
    [66]Krings i W,izadmanesh i.A graph based model for survivability applications.European Journal of Operational Research,2005,164(3):680-689P
    [67]Lin W,Varshney P K.On survivability measures for military networks.Military Communication Conference,1990:1120-1124P
    [68]包秀国,胡铭曾,张宏莉等.两种网络安全管理系统的生存性定量分析方法.诵信学报.2004.25(9):34-41页
    [69]Zolfaghari A,Kaudel F J.Framework for network survivability performance.IEEE Journal on Selected Areas in Communications,1994,12(1):49-51P
    [70]Frank H,Frisch I.Analysis and design of survivable networks.IEEE Transactions on Communication Technology,1970,18(5):501-519P
    [71]Fabrice S,rod C,Sankalp S,Adnan A.Model-based validation of an intrusion-tolerant information system.Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems.Florianpolis,Brazil,2004:184-194P
    [72]Liew S C,Lu K W.A framework for network survivability characterization.Proceedings of the IEEE International Conference on Discovering a New World of Communications.Chicago,USA,1992:405-410P
    [73]Molisz W.Survivability function-a measure of disaster-based routing performance.IEEE Journal on Selected Areas in Communications,2004,22(9):1876-1883P
    [74]Jha S,Wing J M.Survivability analysis of networked system.Proceedings of the 23rd International Conference.Toronto,Ontario,Canada,2001:307-317P
    [75]Kang H Z,Butler C,Yang Q P.A new survivability measure for military communication networks.Proceedings of the MilitaryCommunications Conference.Boston,MA,USA,1998:71-75P
    [76]Purohit N,Tokekar S.Survivability index for GSM network.Proceedings of the 3rd International Conference on Wireless Communication and Sensor Networks.Allahabad,India,2007:105-109P
    [77]Newport K T.Incorporating survivability considerations directly into the network design process.Proceedings of the 9th Annual Joint Conference of the IEEE Computer and Communication Societies.San Francisco,CA,USA,1990:215-220P
    [78]Krairiksh T,Saivichit C.Network restoration utilizing load distribution factor as survivability performance index.Proceedings of the International Symposium on Communications and Information Technologies.Bangkok,Thailand,2006:216-221P
    [79]Dahalberg T A,Surbramanian K A.Visualization of real-time survivability metrics for mobile networks.Proceedings of the 3rd ACM International Workshop on Modeling,Analysis and Simulation of Wireless and Mobile Systems.Boston,Massachusetts,US,2000:113-118P
    [80]Gautam B R,Schulz N N,Srivastava A K.Developing a survivability index for distribution systems including islanding.Proceedings of the 39th North American Power Symposium.Las Cruces,USA,2007:595-599P
    [81]Liu Y,Trivedi K S.A general framework for network survivability quantification.Proceedings of the 3rd Polish-German Teletraffic Symposium.Dresden,Germany,2004:369-378P
    [82]Gautam B R,Schulz N N,Srivastava A K.Developing a survivability index for distribution systems including islanding.Proceedings of the 39th North American Power Symposium.Las Cruces,NM,USA,2007:595-599P
    [83]Linger C,Lipson H F,Mchugh J,Mead N R.Life-cycle models for survivable systems.Technical Report,http://www.cert.org/ archive/pdf/02tr026.pdf,2002
    [84]Cankaya H C,Nair V S S.A survivability assessment tool for restorable networks.Proceedings of the 3rd IEEE Symposium on Application-Specific Systems and Software Engineering Technology.Richardson,TX,USA,2000:130-134P
    [85]Mcdermott J.Attack-potential-based survivability modeling for high-consequence systems.Proceedings of the 3rd IEEE International Workshop on Information Assurance.Callege Park,Maryland,USA,2005:119-130P
    [86]Mead N R.Requirements engineering for survivable system.Technical Report,http://www.cert.org/archive/pdf/03tn013.pdf,2003
    [87]Ellison R J,Fisher D A,Linger R C,Lipson H F.An approach to survivable systems.Proceedings of the NATO 1st Symposium on Protecting Information Systems in the 21st Century.Washington,DC,1999
    [88]胡宝清.模糊理论基础.武汉:武汉大学出版社,2004
    [89]许树柏.层次分析法原理.天津:天津大学出版社,1987
    [90]Fan Z P,Gong X B,Zhang Q.Methods of normalizing the decision matrix for multiple attribute decision making problems with intervals.Journal of Northeastern University(Natural Science),1999,20(3):326-329P
    [91]林闯.随机Petri网和系统性能评价.北京:清华大学出版社,2000
    [92]Hermarms H,Ribaudo M.Exploiting symmetries in stochastic process algebras.Proceedings of the 12th European Simulation Mu]ticonference on Simulation-Past,Present and Future.Manchester,UK,1998:763-770P
    [93]Sbeity I,Brenner L,Plateau B,Stewart W J.Phase-type distributions in stochastic automata networks.European Journal of Operational Research,2008,186(3):l008-1028P
    [94]Hillston J,Ribauda M.Stochatic process algebra:a new approach to performance modeling.Modeling and Simulation of Advanced Computer Systems,1998,23(2):235-255P
    [95]Thomas N,Bradley J,Thornley D.An approximate solution of PEPA models using component substitution.Computers and Digital Techniques,2003,150(2):67-74P
    [96]Hillston J.A compositional approach to performance modeling.New York,NY,USA:Cambridge University Press,1996
    [97]Hermanns H,Herzog U,Mertsiotakis V.Stochastic process algebras as a tool for performance and dependability modeling.Proceedings of International Computer Performance and Dependability Symposium.Erlangen,Germany,1995:102-113P
    [98]Bernardo M,Corrieri R.A tutorial on EMPA:a theory of concurrent processes with nondeterminism,priorities,probabilities and time.Theoretical computer science,1998,202(1-2):1-54P
    [99]Clark G,Gilmore S,Hillston J,Thomas N.Experiences with the PEPA performance modeling tools.IEEE Software,1999,146(1):11-19P
    [100]Hermanns H,Herzog U,Klehmet U,Mertsiotakis V,Siegle M.Compositional performance modelling with the TIPPtool.Performance Evaluation,2000,39(1-4):5-35P
    [101]Aldini A,Bernardo M.TwoTowers 4.0:towards the integration of security analysis and performance evaluation.Proceedings of the lst International Conference on the Quantitative Evaluation of Systems.Enschede,Netherlands,2004:334-335P
    [102]Hillston J.Process algebras for quantitative analysis.Proceedings of the 20th Annual IEEE Symposium on Logic in Computer Science.Chicago,IL,USA,2005:239-248P
    [103]hipson H F,Fisher D A.Survivability-a new security paradigm for protecting highly distributed mission critical systems.http://www,.cert.org/archive/pdf/surviv-paradigm,pdf,2002
    [104]Ferson S,Tucker W T.Sensitivity analysis using probability bounding.Reliability Engineering & System Safety,2006,91(10-11):1435-1442P
    [105]Xu C G,Gertner G Z.Uncertainty and sensitivity analysis for models with correlated parameters.Reliability Engineering &System Safey,2008,93(10):1563-1573p
    [106]高献伟,林雪纲,许榕生.生存性分析方法中的3R量化分析.计算机仿真.2004,21(11):125-128页
    [107]Madan B B,Go(?) eva-Popstojanova K,Vaidyanathan K,Trivedi K S.A method for modeling and quantifying the security attributes of intrusion tolerant systems.Performance Evaluation,2004,56(1-4):167-186P
    [108]Lindemann C.Employing the randomization technique for solving Stochastic Petri Nets models.Proceedings of 6.GI/ITG Conference on Modeling,Measurement and Evaluation of Computing Systems.Munich,Oermany,1991:306-319P
    [109]Kwiatkowska M.Model checking for probability and time:from theory to practice.Proceedings of the 18th IEEE Symposium on hogic in Computer Science.Ottawa,Canada,2OO3:351-360P
    [110]Kwiatkowska M,Norman G,Parker D.PRISM 2.0:a tool for probabilistic model checking.Proceedings of the 1st International Conference on Quantitative Evaluation of Systems.Enschede,Netherlands,2004:322-323P
    [111]PRISM.http://www.prismmodelcbecker.org/
    [112]Liu J S,Chen R.Sequential Monte Carlo methods for dynamic systems.Journal of the American Statistical Association,1998,93:1032-1044P
    [113]陈秀真,郑庆华,管晓宏.网络化系统安全态势评估的研究.西安交通大学学报.2004,38(4):404-408页
    [114]MARTIN R,CHTIS G.Snort users manual,Snort release 2.0.0.http://www.snort.org/docs/SnortUsersManual,pdf,2003
    [115]Honeynet Project.Know your enemy:statistic,http://HoneyNet.org/papers/stats/,2001

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700