版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China Institute of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang 050054 China
出 版 物:《Jisuanji Xuebao/Chinese Journal of Computers》 (Jisuanji Xuebao)
年 卷 期:2009年第32卷第4期
页 面:784-792页
核心收录:
学科分类:08[工学] 0835[工学-软件工程] 0813[工学-建筑学] 0814[工学-土木工程] 0812[工学-计算机科学与技术(可授工学、理学学位)]
摘 要:Using the access control relationship, the partial-order structures of subjects and objects in the system and their mapping relationship are defined, and a hierarchy-mapping based insider threat model is developed on these definitions. Then, this model is applied to build a cloud model which characterizes the states of insider threat in the system. Based on the proposed cloud model, an algorithm, which improves the accuracy and objectivity in evaluation, is also designed for sensing the insider threat in the system. Compared to the previous works, the algorithm could analyze threats of the system in various respects and makes decision qualitatively and quantitatively. As a result, the experiments show that the algorithm could effectively sense the insider threat in real-time.