基于贝叶斯网络的遥感云用户行为认证方法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Bayesian network method for remote sensing cloud user behavior authentication
  • 作者:成路肖 ; 阎继宁 ; 焦阳 ; 马艳 ; 王玉柱
  • 英文作者:Cheng Luxiao;Yan Jining;Jiao Yang;Ma Yan;Wang Yuzhu;School of Information Science & Engineering,Yanshan University;School of Computer Science,China University of Geosciences;Institute of Remote Sensing & Digital Earth,Chinese Academy of Sciences;School of Information Engineering,China University of Geosciences;
  • 关键词:用户行为认证 ; 贝叶斯网络 ; 遥感云服务平台 ; 行为分析 ; 云计算
  • 英文关键词:user behavior authentication;;Bayesian network;;remote sensing cloud platform;;behavior analysis;;cloud computing
  • 中文刊名:JSYJ
  • 英文刊名:Application Research of Computers
  • 机构:燕山大学信息科学与工程学院;中国地质大学(武汉)计算机学院;中国科学院遥感与数字地球研究所;中国地质大学(北京)信息工程学院;
  • 出版日期:2018-02-08 17:55
  • 出版单位:计算机应用研究
  • 年:2019
  • 期:v.36;No.328
  • 基金:国家“863”计划资助项目(2013AA12A301);; 国家重点研发计划项目(2016YFB0200800);; 国家自然科学基金资助项目(61602477)
  • 语种:中文;
  • 页:JSYJ201902028
  • 页数:5
  • CN:02
  • ISSN:51-1196/TP
  • 分类号:127-131
摘要
针对遥感云服务平台中不可信用户的入侵现象,结合遥感云用户行为特点和贝叶斯网络算法设计了一种用户行为认证方案。该方案论述了遥感云平台用户的行为认证机制,并且根据用户行为特点建立了用户行为认证集,结合贝叶斯网络算法预测特点和用户行为属性建立了用于认证等级预测的贝叶斯网络模型,把该模型中分析得出的用户行为属性的权重信息应用到用户等级预测算法中,使该算法针对遥感云用户认证更安全准确,从而实现对用户行为认证等级的预测。仿真实例表明该方法能够准确识别出不可信用户,有效保证遥感云服务平台的安全性。
        Aiming at the intrusion of untrusted users in remote sensing cloud platform,this paper designed a user behavior authentication scheme based on the characteristics of remote sensing cloud user behavior and Bayesian network algorithm. The scheme discussed the users' behavior authentication mechanism of remote sensing cloud platform,and according to the users' behavior characteristics,the scheme established an authentication set on users' behavior. It combined with the predictive characteristics of Bayesian network algorithm and user behavior properties to set up a Bayesian network model for authentication grade prediction. It applied the weight information of user behavior attributes analyzed in this model to the user grade prediction algorithm,which made the algorithm more secure and accurate for remote sensing cloud user authentication safer accurately,so as to realize the prediction of user behavior authentication level. Simulation examples show that the model is effective to identify untrusted users accurately,and can ensure the security of remote sensing cloud platform.
引文
[1]李小宁,李磊,金连文,等.基于OpenStack构建私有云计算平台[J].电信科学,2012,28(9):1-8.(Li Xiaoning,Li Lei,Jin Lianwen,et al. Construction of private cloud computing platform based on OpenStack[J]. Telecommunications Science,2012,28(9):1-8.)
    [2] Reichert A. Paa S的未来、应用及其安全性[EB/OL].(2014-09-02)[2017-09-05]. https://searchcloudcomputing. techtarget. com.cn/5-10646/.(Reichert A. Future,application and security of Paa S[EB/OL].(2014-09-02)[2017-09-05]. https://searchcloudcomputing. techtarget. com. cn/5-10646/.)
    [3]田立勤,林闯.可信网络中一种基于行为信任预测的博弈控制机制[J].计算机学报,2007,30(11):1930-1938.(Tian Liqin,Lin Chuang. A kind of game-theoretic control mechanism of user behavior trust based on prediction in trustworthy network[J]. Chinese Journal of Computers,2007,30(11):1930-1938.)
    [4]邹冰玉,张焕国,郭曦,等.可信网络连接中一种基于可信度的细粒度授权模型[J].武汉大学学报:理学版,2010,56(2):147-150.(Zou Bingyu,Zhang Huanguo,Guo Xi,et al. A fine-grained dynamic network authorization model based on trust level in trusted connecting network[J]. Journal of Wuhan University:Neo-confucianism Edition,2010,56(2):147-150.)
    [5]朱莉蓉,陈宁江,何佩聪,等.基于动态信任管理的云用户行为认证服务系统[J].广西大学学报:自然科学版,2015,40(6):1485-1493.(Zhu Lirong,Chen Ningjiang,He Peicong,et al. A cloud user behavior authentication system based on dynamic trust management[J]. Journal of Guangxi University:Natural Science,2015,40(6):1485-1493.)
    [6]徐剑,李明洁,周福才,等.基于用户鼠标行为的身份认证方法[J].计算机科学,2016,43(2):148-154.(Xu Jian,Li Mingjie,Zhou Fucai,et al. Identity authentication method based on user’s mouse behavior[J]. Computer Science,2016,43(2):148-154.)
    [7]李良,田立勤,李君建.云计算环境下用户行为的认证与预测[J].计算机系统应用,2016,25(6):125-130.(Li Liang,Tian Liqin,Li Junjian. Authentication and predication of user behavior in cloud computing[J]. Computer System and Application,2016,25(6):125-130.)
    [8]陈亚睿,田立勤,杨扬.云计算环境下动态用户行为认证的机制、模型与分析[J].系统仿真学报,2011,23(11):2302-2307.(Chen Yarui,Tian Liqin,Yang Yang. Modeling and analysis of dynamic user behavior authentication scheme in cloud computing[J]. Journal of System Simulation,2011,23(11):2302-2307.)
    [9]陈亚睿.云计算环境下用户行为认证与安全控制研究[D].北京:北京科技大学,2012.(Chen Yarui. Research on user behavior authentication and security control in cloud computing[D]. Beijing:University of Science and Technology Bejing,2012.)
    [10]赵洁,肖南峰,钟军锐.基于贝叶斯网络和行为日志挖掘的行为信任控制[J].华南理工大学学报:自然科学版,2009,37(5):94-100.(Zhao Jie,Xiao Nanfeng,Zhong Junrui. Behavior trust control based on networks and user behavior log mining[J]. Journal of South China University of Technology:Natural Science,2009,37(5):94-100.)
    [11]田立勤.网络用户行为的安全可信分析与控制[M].北京:清华大学出版社,2011:144-152.(Tian Liqin. Secure and trusted analysis and control of network user behavior[M]. Beijing:Tsinghua University Press,2011:144-152.)
    [12]王晓菊,田立勤,赵竞雄.基于物联网的用户行为认证机制与分析[J].南京理工大学学报:自然科学版,2015,39(1):70-77.(Wang Xiaoju,Tian Liqin,Zhao Jingxiong. User behavior authentication mechanism and analysis based on IOT[J]. Journal of Nanjing University of Science And Technology:Natural Science,2015,39(1):70-77.)
    [13]魏中强,徐宏喆,李文,等.基于最大信息系数的贝叶斯网络结构学习算法[J].计算机应用研究,2014,31(11):3261-3265.(Wei Zhongqiang,Xu Hongzhe,Li Wen,et al. Bayesian network structure learning algorithm based on maximal information coefficient[J]. Application Research of Computers,2014,31(11):3261-3265.)
    [14] Tang Haitao,Mantao W. User identity authentication based on the combination of mouse and keyboard behavior[J]. International Journal of Security and Its Applications,2016,10(6):29-36.
    [15]慕春棣,戴剑彬,叶俊.用于数据挖掘的贝叶斯网络[J].软件学报,2000,11(5):660-666.(Mu Chundi,Dai Jianbin,Ye Jun.Bayesian network for data mining[J]. Journal of Software,2000,11(5):660-666.)
    [16]Abramson M,Aha D W. User authentication from Web browsing behavior[C]//Proc of FLAIRS Conference. Palo Alto, California:AAAI Press,2014.
    [17]Tian Liqin,Lin Chuang,Ni Yang. Evaluation of user behavior trust in cloud computing[C]//Proc of IEEE International Conference on Computer Application and System Modeling. Piscataway,NJ:IEEE Press,2010:V7-567-V7-572.
    [18]冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.(Feng Dengguo,Zhang Min,Zhang Yan,et al. Study on cloud computing security[J]. Journal of Software,2011,22(1):71-83.)
    [19] Goel N K,Jha C. Analyzing users behavior from Web access logs using automated log analyzer tool[J]. International Journal of Computer Applications,2013,62(2):29-33.
    [20]Brosso I,Neve A L,Bressan G,et al. A continuous authentication system based on user behavior analysis[C]//Proc of IEEE Ares’10International Conference on Availability,Reliability,and Security.Piscataway,NJ:IEEE Press,2010:380-385.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700