Design and Application of a Network Security Model

Article Preview

Abstract:

This paper analyzes the deficiency of P2DR security model, and proposes a kind of new active dynamic security model AD-RPPDRRM, in which risk analysis, management and recovery are imported. On the basis of this model, basic technologies used to implement the defense in depth system are discussed. At last, a defense in-depth system of a typical network is given.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2773-2776

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yu W, Chellappan S, Wang X, et al. Peer-to-peer system-based active worm attacks: Modeling,. Analysis and Defense, Computer Communications (Elsvier), 31, 2008, pp.4005-4017.

DOI: 10.1016/j.comcom.2008.08.008

Google Scholar

[2] Wei Jiang. Research on active defense based on attack-defense game model,. Harbin: Harbin Institute of Technology. Doctor thesis, (2010).

Google Scholar

[3] <<ISO/IEC 15408 Information technology-Security techniques - Evaluation criteria for IT Security>>.

Google Scholar

[4] Xiaoping Wu, Zemao Chen, et al. The theory and defense of Information countermeasures,. Wuhan: Wuhan university press, (2008).

Google Scholar

[5] Renquan Huang, Weiming Li, et al. Research on the defense in depth system of air defense information network,. Computer Science, 38(10A), 2011, pp.53-58.

Google Scholar