网络与信息安全学报 ›› 2019, Vol. 5 ›› Issue (2): 58-65.doi: 10.11959/j.issn.2096-109x.2019017

• 学术论文 • 上一篇    下一篇

机密稳健复杂系统安全性评估方法

左金鑫1,2(),郭子裕1,2,李瑾1,2,张洁3,陆月明1,2   

  1. 1 北京邮电大学,北京 100876
    2 可信分布计算与服务教育部重点实验室,北京 100876
    3 军事科学研究院系统工程院,北京 100091
  • 修回日期:2018-12-20 出版日期:2019-04-15 发布日期:2019-04-16
  • 作者简介:左金鑫(1992- ),女,山东德州人,北京邮电大学博士生,主要研究方向为网络空间安全。|郭子裕(1994- ),男,河北石家庄人,北京邮电大学博士生,主要研究方向为网络空间安全。|李瑾(1996- ),女,黑龙江齐齐哈尔人,北京邮电大学硕士生,主要研究方向为网络空间安全。|张洁(1981- ),女,军事科学研究院系统工程院教授,主要研究方向为信息安全。|陆月明(1969- ),男,江苏苏州人,北京邮电大学教授、博士生导师,主要研究方向为分布式计算、网络空间安全。
  • 基金资助:
    国家重点研发计划基金资助项目(2016YFF0204001)

Security evaluation method for confidential and stable complex systems

Jinxin ZUO1,2(),Ziyu GUO1,2,Jin LI1,2,Jie ZHANG3,Yueming LU1,2   

  1. 1 Beijing University of Posts and Telecommunications,Beijing 100876,China
    2 Key Laboratory of Trustworthy Distributed Computing and Service (BUPT),Ministry of Education,Beijing 100876,China
    3 Institute of Systems Engineering,Academies of Military Science,Beijing 100091,China
  • Revised:2018-12-20 Online:2019-04-15 Published:2019-04-16
  • Supported by:
    The National Key Research and Development Program(2016YFF0204001)

摘要:

机密稳健复杂系统具有高机密性要求、持续稳定运行需求、网络结构复杂等特点,但现有评估模型安全目标维度单一,缺乏指标间关联性分析。鉴于此,提出了基于指标关联性分析的综合安全评估模型,确立涵盖产品、系统和服务3个层面的机密性、可用性、可控性、可鉴别性、人员组织、风险管理、企业定级、可持续性8个安全目标。以智慧医疗物联网机密性为例,构建了基于指标关联性的排序确权算法,采用模糊综合评价法,对所选系统进行评估。

关键词: 机密稳健复杂系统, 信息安全评估, 排序算法, 模糊综合评价法

Abstract:

Confidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In view of this,a comprehensive security evaluation model based on the correlation analysis of indicators is proposed and eight security objectives covering confidentiality,availability,controllability,identifiability,personnel organization,risk management,enterprise grading and sustainability at three levels of product,system and service have been established.Taking the confidentiality of the smart medical IoT as an example,a sorting and weight confirmation algorithm based on index correlation is constructed,and the fuzzy comprehensive evaluation method is used to evaluate the selected system.

Key words: confidential and stable complex system, information security evaluation, sort algorithm, fuzzy comprehensive evaluation method

中图分类号: 

No Suggested Reading articles found!