高速信息网络安全管理方法研究仿真
发布时间:2018-04-27 19:27
本文选题:感染节点 + 安全管理 ; 参考:《计算机仿真》2017年04期
【摘要】:对高速信息网络中的数据和信息进行安全管理,可提高网络中数据信息的安全系数,保证网络的良好运行。进行高速信息网络安全管理时,应对网络路由进行搜索,寻找可能受到网络入侵影响节点的集合,利用集合组建安全管理模型,但是传统方法依据网络入侵可以影响网络中片面节点的邻居数的原理,依据汇总路由节点的邻居数目,对邻居数目的大小与实际值进行比对,将存在风险的数据信息进行消除,但不能组建精确的网络安全管理模型,降低了安全管理的精度和效果。提出一种新的高速信息网络安全管理方法。首先利用节点对路由进行查询,通过路由节点的邻居数量找寻可能受到入侵影响节点的集合,同时组建高速信息网络入侵模型,在网络模型边缘布置部分初始、目的节点对,然后通过路由查询过程来发现跳数异常变少的可疑路由,利用检查邻居节点数目来检测可疑路径上的各个节点,假设节点的邻居数目增加,将该节点视为受网络攻击的感染节点,说明网络中存在网络攻击,组建安全管理模型,将节点上的数据和信息转移到其它正常节点上,完成高速信息网络安全管理。仿真结果表明,上述方法能够有效的对高速信息网络中的数据和信息进行安全和有效的管理。
[Abstract]:The safe management of the data and information in the high-speed information network can improve the safety coefficient of the data information in the network and ensure the good operation of the network. In the process of high speed information network security management, the network route should be searched to find the set of nodes that may be affected by network intrusion, and the security management model should be constructed by using the set. However, according to the principle that network intrusion can affect the number of neighbors of one-sided nodes in the network, the traditional method compares the size of neighbor number with the actual value according to the number of neighbors of aggregated routing nodes, and eliminates the risky data information. However, the precise network security management model can not be built, which reduces the precision and effect of security management. A new security management method for high speed information network is proposed. Firstly, the nodes are used to query the routing, and the number of neighbors of the routing nodes is used to find the set of nodes that may be affected by the intrusion. At the same time, the intrusion model of high-speed information network is constructed, and the initial part of the network model is arranged at the edge of the network model. Then, the suspicious route with fewer hops is found through the routing query process, and the number of neighbor nodes is checked to detect each node on the suspicious path, assuming that the number of neighbors increases. The node is regarded as the infected node which is attacked by the network. The security management model is set up and the data and information on the node are transferred to other normal nodes to complete the security management of high-speed information network. Simulation results show that the proposed method can effectively manage the data and information in high speed information networks.
【作者单位】: 东北石油大学电信系;
【分类号】:TP393.08
【参考文献】
相关期刊论文 前10条
1 茆金枝;郭e,
本文编号:1812007
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/1812007.html