Title :
Evaluation for network security based on the Read-Write transition model
Author :
Zhiyong Lu ; Chaojing Tang
Author_Institution :
Coll. of Electron. Sci. & Eng., Nat. Univ. of Defense Technol., Changsha, China
Abstract :
The evaluation of network security is a hot issue in present research of network security. After acquiring each host´s confidentiality, integrity and availability evaluation index by attacking the network, we can directly evaluate the network security. But, for the network with Read-Write management privilege setting to the root directory, it is necessary to execute the state transition of the security attribute value by reason of the existence of root directory Read-Write relationship. Firstly, the Read-Write transition model and correlative concepts are presented for the root directory with Read-Write privilege setting; then the model transition function is formalized by the state transition arithmetic operator ⊙. Based on the transition model, we have designed the network security state transition machine and the network security evaluation model. Finally, the method´s feasibility and validity are verified by practical example analysis.
Keywords :
computer network security; model transition function; network security evaluation; read write management privilege setting; read write transition model; root directory; state transition machine; Arithmetic; Chaos; Computer networks; Educational institutions; Helium; Hydrogen; Mathematical model; National security; Peer to peer computing; Testing; Read-Write transition model; evaluation; modeling; network security;
Conference_Titel :
Advanced Computer Control (ICACC), 2010 2nd International Conference on
Conference_Location :
Shenyang
Print_ISBN :
978-1-4244-5845-5
DOI :
10.1109/ICACC.2010.5487074