摘要
为了减少网络异常事件发生,需要将网络管理、通信控制等方面联系起来共同进行网络防御。因此,设计信息保障技术框架(IATF)思想下的网络安全系统。设计的系统由内网、访问控制模块、外网与业务网组成,其三层网络框架使网络设施部署与信息隔离变得更加容易。访问控制模块利用IATF思想在信息传输装置上建立多层强力安全防御机制,设计网络安全防御体系与IATF信息安全防御模型,实现IATF认证与授权机制。实验结果表明,该系统的整体运行效果佳,防御性良好。
In order to reduce the occurrence of network abnormal events,it is necessary to combine the network management,communication control and other aspects for network defense. Therefore,a network security system based on information assurance technology framework(IATF)was designed. The system is composed of internal network,access control module,external network and business network. And its three-layer network framework makes the network facilities deployment and information isolation easier. The IATF thought is used to establish the multi-layer powerful security defense mechanism in the information transmission device. The network security defense system and IATF information security defense model were designed to realize the IATF authentication and authorization mechanism. The experimental results show that the system has perfect overall running performance and high defensive performance.
引文
[1]房潇,李玉东,马琳,等.基于模糊理论的信息系统安全防护有效性评估研究[J].计算机与数字工程,2015,43(4):661-665.FANG Xiao,LI Yudong,MA Lin.et al.Effectiveness assessment of controls taken in information system based on fuzzy theory[J].Computer and digital engineering,2015,43(4):661-665.
[2]吕欣,韩晓露,毕钰,等.大数据安全保障框架与评价体系研究[J].信息安全研究,2016,2(10):913-919.LüXin,HAN Xiaolu,BI Yu,et al.Research on the framework and evaluation system of big data security assurance[J].Journal of information security research,2016,2(10):913-919.
[3]冯茜,王磊.无人机自动驾驶系统稳定性控制优化仿真[J].计算机仿真,2016,33(7):65-68.FENG Qian,WANG Lei.Optimization design of the control system of UAV autonomous study[J].Computer simulation,2016,33(7):65-68.
[4]曹冬.基于安全的逻辑关系思想在PLC编程上的应用[J].中国钼业,2016,40(6):58-60.CAO Dong.Application of logic relation based on security in PLC programming[J].China molybdenum industry,2016,40(6):58-60.
[5]DING H.Application and design of patient temperature acquisition system based on wireless sensor network[J].International journal of online engineering,2017,13(5):18-22.
[6]魏先勇,王化喆.基于软件的网络安全评测系统研究与设计[J].现代电子技术,2016,39(1):89-92.WEI Xianyong,WANG Huazhe.Research and design of network security evaluation system based on software[J].Modern electronics technique,2016,39(1):89-92.
[7]李升友,杨国梁,多英全,等.安全系统思想内涵及其应用研究:探讨用安全系统思想实现城市安全发展[J].中国安全生产科学技术,2016,12(7):145-149.LI Shengyou,YANG Guoliang,DUO Yingquan,et al.Study on connotation of safety system idea and its application-discussion on implementing urban safety development with safety system idea[J].Journal of safety science and technology,2016,12(7):145-149.
[8]FAN Q,WANG T,CHEN Y,et al.Design and application of fuzzy logic system based on QPSO intelligent algorithm[J].ICIC express letters,2017,11(1):133-149.