基于安全本体的信息安全知识聚合技术研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research on Aggregation Technology for Information Security Knowledge Based on Security Ontology
  • 作者:梁中 ; 周嘉坤 ; 朱汉 ; 陈波
  • 英文作者:LIANG Zhong;ZHOU Jiakun;ZHU Han;CHEN Bo;Office of Informatization Construction & Management,Nanjing Normal University;School of Computer Science and Technology,Nanjing Normal University;
  • 关键词:安全本体 ; 安全教育 ; 知识聚合 ; 主题爬虫 ; 信息安全
  • 英文关键词:security ontology;;security education;;knowledge aggregation;;focused crawler;;information security
  • 中文刊名:XXAQ
  • 英文刊名:Netinfo Security
  • 机构:南京师范大学信息化建设管理处;南京师范大学计算机科学与技术学院;
  • 出版日期:2017-04-10
  • 出版单位:信息网络安全
  • 年:2017
  • 期:No.196
  • 基金:江苏省教育科学十二五规划重点资助项目[B-a/2013/01/013];; “赛尔网络”下一代互联网技术创新项目[NGII20160509];; 中国学位与研究生教育研究课题[B1-2015Y11-026]
  • 语种:中文;
  • 页:XXAQ201704012
  • 页数:8
  • CN:04
  • ISSN:31-1859/TN
  • 分类号:84-91
摘要
在信息安全教育资源的构建中,为使主题爬虫更全面、准确、快速地获取教育所需的信息安全领域知识,文章通过建立信息安全领域本体,为主题提供高度专业化的精准领域定义描述;通过安全本体描述中概念间的关系,扩展主题信息的语义范围,基于最大相关度引导下的深度优先遍历方法,对爬取的网页在语义概念层进行相关性分析,以提高主题爬虫信息爬取的准确率;采用广度优先搜索策略与链接相关度计算相结合的混合爬取策略,指导主题爬虫进行页面信息的爬取,以有效提升主题爬虫的爬取效率。通过与基于关键词描述的主题爬虫的对比实验验证了该方法的有效性。
        In order to make the focused crawler comprehensive and accurately access to information security knowledge required by education in the construction of information security educating resources, this paper proposes a knowledge aggregation framework for information security. It established information security ontology to provide highly specialized precise delimiting description to the field of focused crawler. The depth-first traversal method guided by the maximum correlation and the correlation analysis in the semantic layer of crawled web page can improve the accuracy of the crawling information by the focused crawler. Using the mixed crawling strategy combining the breadthfirst search strategy with the calculation to the connecting degree can improve the effectiveness of the crawling information by the focused crawler. The experiment comparing with focused crawler based on the description of keywords verifies the effectiveness of the proposed method.
引文
[1]AL AWAWDEH S,TUBAISHAT A.An Information Security Awareness Program to Address Common Security Concerns in IT Unit[C]//IEEE.2014 Eleventh International Conference on Information Technology:New Generations,April 7-9,2014,Las Vegas,USA.New York:IEEE,2014:273-278.
    [2]ABAWAJY J.User Preference of Cyber Security Awareness Delivery Methods[J].Behaviour&Information Technology,2014,33(3):237-248.
    [3]KEARNEY W D,KRUGER H A.Can Perceptual Differences Account for Enigmatic Information Security Behaviour in an Organization?[J].Computers&Security,2016(61):46-58.
    [4]朱燕丽.基于RSS的用户信息安全意识教育系统设计与实现[D].南京:南京师范大学,2014.
    [5]朱汉.适应用户需求及其演进的信息安全素养教育系统设计与实现[D].南京:南京师范大学,2016.
    [6]丁雪,张玉峰.基于本体的智能数字图书馆个性化推荐用户本体研究[J].现代情报,2009,29(12):61-65,7.
    [7]徐德斌.基于领域本体的知识整合浅析[J].现代情报,2011,31(12):27-29,3.
    [8]刘启华.泛在商务环境下的信息聚合与推荐[M].上海;复旦大学出版社,2014.
    [9]钟杰,王海舟,王文贤.基于话题的微博信息传播拓扑结构研究[J].信息网络安全,2016(3):64-70.
    [10]RASKIN V,HEMPELMANN C F,Triezenberg K.E.,et al.Ontology in Information Security:a Useful Theoretical Foundation and Methodological Tool[C]//ACM.2001 Workshop on New Security Paradigms,September 10-13,2001,Cloudcroft,USA.New York:ACM,2001:53-59.
    [11]DONNER M.Toward a Security Ontology[J].IEEE Security&Privacy,2003,1(3):6-7.
    [12]PEREIRA T,SANTOS H.An Ontology Based Approach to Information Security[C]//Springer.Third International Conference on Metadata and Semantic Research,October 1-2,2009,Milan,Italy.Heidelberg:Springer-Verlag Berlin,2009:183-192.
    [13]LIU F H.Constructing Enterprise Information Network Security Risk Management Mechanism by Using Ontology[C]//IEEE.21st International Conference on Advanced Information Networking and Applications,May 21-23,2007,Niagara Falls,Canada.New York:IEEE,2007:929-934.
    [14]LICCARDO L,RAK M,DI MODICA G,et al.Ontologybased Negotiation of Security Requirements in Cloud[C]//IEEE.Fourth International Conference on Computational Aspects of Social Networks,November 21-23,2012,Sao Carlos,USA.New York:IEEE,2012:192-197.
    [15]TAKAHASHI T,FUJIWARA H,KADOBAYASHI Y.Building Ontology of Cybersecurity Operational Information[C]//ACM.Sixth Annual Workshop on Cyber Security and Information Intelligence,April 21-23,2010,Oak Ridge,USA.New York:ACM,2010:87-91.
    [16]YAO Y,WANG X,MENG X,et al.ISEK:An Information Security Knowledge Graph for CISP Knowledge System[C]//IEEE.5th International Conference on IT Convergence and Security,August 24-27,Kuala Lumpur,Malaysia.New York:IEEE,2015:1-4.
    [17]罗力.国民信息安全素养评价指标体系构建研究[J].图书情报工作,2012,56(6):25-28.
    [18]陈腾,袁小群,曾元祥.领域本体的作用及构建实例[J].出版科学,2013,21(5):79-84.
    [19]陈华山,皮兰,刘峰,等.网络空间安全科学基础的研究前沿及发展趋势[J].信息网络安全,2015(3):1-5.
    [20]郑健珍,林坤辉,周昌乐,等.基于本体语义的定题爬虫[J].山东大学学报:理学版,2006,41(3):106-110.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700