IATF思想下的网络安全系统设计及应用
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Design and application of network security system based on IATF thought
  • 作者:杨冠杰
  • 英文作者:YANG Guanjie;Weifang University of Science and Technology;
  • 关键词:信息保障技术框架 ; 网络安全系统 ; 三层网络框架 ; 防御机制 ; 性能测试 ; 认证
  • 英文关键词:information assurance technology framework;;network security system;;three-layer network framework;;defense mechanism;;performance test;;authentication
  • 中文刊名:XDDJ
  • 英文刊名:Modern Electronics Technique
  • 机构:潍坊科技学院;
  • 出版日期:2018-01-01
  • 出版单位:现代电子技术
  • 年:2018
  • 期:v.41;No.504
  • 语种:中文;
  • 页:XDDJ201801019
  • 页数:4
  • CN:01
  • ISSN:61-1224/TN
  • 分类号:89-92
摘要
为了减少网络异常事件发生,需要将网络管理、通信控制等方面联系起来共同进行网络防御。因此,设计信息保障技术框架(IATF)思想下的网络安全系统。设计的系统由内网、访问控制模块、外网与业务网组成,其三层网络框架使网络设施部署与信息隔离变得更加容易。访问控制模块利用IATF思想在信息传输装置上建立多层强力安全防御机制,设计网络安全防御体系与IATF信息安全防御模型,实现IATF认证与授权机制。实验结果表明,该系统的整体运行效果佳,防御性良好。
        In order to reduce the occurrence of network abnormal events,it is necessary to combine the network management,communication control and other aspects for network defense. Therefore,a network security system based on information assurance technology framework(IATF)was designed. The system is composed of internal network,access control module,external network and business network. And its three-layer network framework makes the network facilities deployment and information isolation easier. The IATF thought is used to establish the multi-layer powerful security defense mechanism in the information transmission device. The network security defense system and IATF information security defense model were designed to realize the IATF authentication and authorization mechanism. The experimental results show that the system has perfect overall running performance and high defensive performance.
引文
[1]房潇,李玉东,马琳,等.基于模糊理论的信息系统安全防护有效性评估研究[J].计算机与数字工程,2015,43(4):661-665.FANG Xiao,LI Yudong,MA Lin.et al.Effectiveness assessment of controls taken in information system based on fuzzy theory[J].Computer and digital engineering,2015,43(4):661-665.
    [2]吕欣,韩晓露,毕钰,等.大数据安全保障框架与评价体系研究[J].信息安全研究,2016,2(10):913-919.LüXin,HAN Xiaolu,BI Yu,et al.Research on the framework and evaluation system of big data security assurance[J].Journal of information security research,2016,2(10):913-919.
    [3]冯茜,王磊.无人机自动驾驶系统稳定性控制优化仿真[J].计算机仿真,2016,33(7):65-68.FENG Qian,WANG Lei.Optimization design of the control system of UAV autonomous study[J].Computer simulation,2016,33(7):65-68.
    [4]曹冬.基于安全的逻辑关系思想在PLC编程上的应用[J].中国钼业,2016,40(6):58-60.CAO Dong.Application of logic relation based on security in PLC programming[J].China molybdenum industry,2016,40(6):58-60.
    [5]DING H.Application and design of patient temperature acquisition system based on wireless sensor network[J].International journal of online engineering,2017,13(5):18-22.
    [6]魏先勇,王化喆.基于软件的网络安全评测系统研究与设计[J].现代电子技术,2016,39(1):89-92.WEI Xianyong,WANG Huazhe.Research and design of network security evaluation system based on software[J].Modern electronics technique,2016,39(1):89-92.
    [7]李升友,杨国梁,多英全,等.安全系统思想内涵及其应用研究:探讨用安全系统思想实现城市安全发展[J].中国安全生产科学技术,2016,12(7):145-149.LI Shengyou,YANG Guoliang,DUO Yingquan,et al.Study on connotation of safety system idea and its application-discussion on implementing urban safety development with safety system idea[J].Journal of safety science and technology,2016,12(7):145-149.
    [8]FAN Q,WANG T,CHEN Y,et al.Design and application of fuzzy logic system based on QPSO intelligent algorithm[J].ICIC express letters,2017,11(1):133-149.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700