Study on the Quantitative Vulnerability Model of Information System Based on Mathematical Modeling Techniques

Article Preview

Abstract:

The idea of mathematical modeling is used to establish the quantitative model of information system vulnerability assessment, and the model is solved by using the partial differential method. The algorithm is realized by using VB programming, and it obtains the quantitative solution of information system vulnerability. Quantitative assessment of information system security and risk is the difficulty of system vulnerability assessment, and it establishes the risk model of system by means of mathematics modeling idea. The risk model is divided into the actual risk and the potential risk. The paper uses VB programming software, and establishes a quantitative model of information system evaluation by combining with partial differential method, and the algorithm is carried out the experimental verification by using the method of numerical simulation. Through the calculation, the mathematical modeling ideas can effectively obtain the vulnerability quantitative standard and the risk level of information system, which provides the technical reference for the research of information system security evaluation method.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1953-1957

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Bo Jin, Jiajun Liu. Review on the intrusion detection technology [J]. Journal of East China University of Science and Technology, 2010(1): 45-46.

Google Scholar

[2] Jianchun Jiang, Hengtai Ma. A survey of intrusion detection research on network security[J]. Journal of software, 2010(3): 12-13.

Google Scholar

[3] Manjun Lin, Hualin Qian. Intrusion detection system: principle, intrusion hiding and countermeasures [J]. Microelectronics & computer, 2012(1): 23-25.

Google Scholar

[4] Yuanfang Pu, Wei Zhang, Shaohua Teng, Hongle Du. A cooperative network intrusion detection based on decision tree [J]. Journal of Jiangxi Normal University: Natural Science Edition, 2010, 34 (3): 302-307.

DOI: 10.1109/jcpc.2009.5420129

Google Scholar

[6] Houqing Lu, Feng Wang, Yisheng Song, et al. Targets damage assessment system based on compaign simulation [J]. Journal of PLA University of Science and Technology: Natural Science Edition, 2011, 10 (2): 139-143.

Google Scholar

[7] Di Wu, Xiaogang Zhao, Fengxian Zhu. Simulation study and realization of UAV Ad Hoc network in reencounter scenario [J]. Journal of system simulation, 2011, 20 (23): 6409-6413.

Google Scholar

[8] Zhigao Luo, Binbin Fan, Xiaodong Guo, Xiang Wang, Ju Li. Analysis of the three-dimensional melting flow in injection cavity based on the wavelet finite element [J]. China mechanical engineering, 2010, 20 (10): 1244-1247.

Google Scholar

[9] Xing Zhang, Changxiang Shen. A new kind of control module design scheme of the trusted platform [J]. Geomatics and information science of Wuhan University, 2011, 33 (10): 1011-1014.

Google Scholar

[10] Wei Wang, Neng Gao, Lina Jiang. Security demands analysis of cloud computing [J]. Information network security, 2012(30): 67-68.

Google Scholar

[11] Huimo Wang, Yu Zhang. Research on the situation data model in joint operations simulation [J]. Acta Simulate Systematical Sinica, 2011, 20 (15): 4186-4188.

Google Scholar

[12] Jun Liu, Zhe Li, Lei Yue. Design and implementation of the self- organization network simulation platform [J]. Computer science, 2011, 35 (1): 24-26, 30.

Google Scholar