通信学报 ›› 2013, Vol. 34 ›› Issue (3): 183-191.doi: 10.3969/j.issn.1000-436x.2013.03.024

• 学术通信 • 上一篇    下一篇

基于三维球体模型的XML通信协议安全评估方法

杨宏宇,于巾博,谢丽霞   

  1. 中国民航大学 计算机科学与技术学院,天津300300
  • 出版日期:2013-03-25 发布日期:2017-07-20
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家高技术研究发展计划(“863”计划)基金资助项目;天津市科技计划重点基金资助项目;中国民航科技基金资助项目;中国民航科技基金资助项目;中央高校基本科研业务费专项基金资助项目

Three-dimensional spherical model based XML communication protocols security evaluation method

Hong-yu YANG,Jin-bo YU,Li-xia XIE   

  1. School of Computer Science and Technology, Civil Avia ion University of China, Tianjin 300300, China
  • Online:2013-03-25 Published:2017-07-20
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National High Technology Re-search and Development Program of China (863 Program);The Key Project of Science and Technology Support Program of Tianjin;The Science & Technology Project of CAAC;The Science & Technology Project of CAAC;The Central University Basic Science Research Program

摘要:

针对XML通信协议的安全评估问题,提出了一种基于三维球体模型的协议安全评估方法。首先利用评估指标在球体外壳层的坐落位置构建XML通信协议的三维安全评估指标体系,以该坐标系投影面积为度量标准,运用层次分析法(AHP,analytic hierarchy process)、球体半径以及开合角度获取一、二级评估指标的权值。从XML协议的内容、通信载荷、安全隐患3个层面计算XML通信协议各安全分量的量化评估值,通过量化计算和综合分析得到XML通信协议的安全性评估结果。仿真结果表明该方法能有效地评估协议的安全性并可满足对 XML通信协议的安全性评估需要。

关键词: XML, 协议, 三维球体模型, 层次分析法, 安全评估

Abstract:

Aiming at the problems of security assessment in XML communication protocols, a novel three-dimensional spherical model based protocol security evaluation method was proposed. Firstly, a three-dimensional security evaluation index system was constructed through positions of indexes on the spherical shell. Secondly, by using the coordinate's projection area as a measure criterion, evaluation indexes' weights of the first level and the second level were obtained with the analytic hierarchy process (AHP), the sphere and the sector angle. Thirdly, security components values of XML communication protocol were calculated in the aspects of XML's content, communication load and security vulne-rability. Finally, the security evaluation result of XML communication protocol was achieved through quantization calcu-lation and further comprehensive analysis. Experimental results show that this method is competent for the protocol secu-rity evaluation and meets security evaluating requirem L communication protocols effectively.

Key words: XML, protocol, three-dimensional spherical model, AHP, security evaluation

No Suggested Reading articles found!