Assessment of Network Security Policy Based on Security Capability

被引:0
|
作者
Tang, Chenghua [1 ]
Yu, Shunzheng [1 ]
机构
[1] Zhongshan Sun Yat Sen Univ, Dept Elect & Commun Engn, Guangzhou, Guangdong, Peoples R China
关键词
network security; security policy; security capability; validity;
D O I
10.1109/ICCS.2008.4737373
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The validity of the security policy has important impacts on the safety performance of network information system. For purpose of verifying it effectively, an assessment model of network security policy based on security capability is proposed. The relationship of defense methods, application targets, and information security attribute characteristics is analyzed based on the establishing of security domain and security policy, and the network security capability of security policy is evaluated. Result shows that the model can effectively reflect the protect ability of security policy. It provides a new solution and reference for assessing and adjusting the network security policy, so as to better ensure system security.
引用
收藏
页码:1204 / 1208
页数:5
相关论文
共 50 条
  • [21] Network security assessment based on node correlated HMM
    Long, Men
    Xia, Jing-Bo
    Zhang, Zi-Yang
    Guo, Rong-Xiao
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2010, 33 (06): : 121 - 124
  • [22] A Security Situation Assessment Method Based on Neural Network
    Tang, Xiangyan
    Chen, Meizhu
    Cheng, Jieren
    Xu, Jinying
    Li, Hui
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 579 - 587
  • [23] A Composite Network Security Assessment
    Kondakci, Suleyman
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 249 - 254
  • [24] Network Security Classification Assessment Based on Fuzzy Mathematics
    Li, Jiaqi
    You, Ning
    Liu, Jianyi
    Zhang, Ru
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATERIAL, MECHANICAL AND MANUFACTURING ENGINEERING, 2015, 27 : 1878 - 1883
  • [25] Network security situation assessment based on data fusion
    Liu Mixia
    Zhang Qiuyu
    Zhao Hong
    Yu Dongmei
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 542 - 545
  • [26] Network security assessment.
    Gordon, RS
    LIBRARY JOURNAL, 2004, 129 (12) : 112 - 112
  • [27] Network Security Risk Assessment Based on Node Correlation
    Wang, Zengguang
    Lu, Yu
    Li, Jindong
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [28] Network Security Risk Assessment Based on Association Rules
    Cheng, Xiaorong
    Wei, Yan
    Geng, Xin
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1142 - 1145
  • [29] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [30] Security Model Based on Network Business Security
    Wu Kehe
    Zhang Tong
    Li Wei
    Ma Gang
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 1, 2009, : 577 - 580