CN109274539A - 基于遗传算法的网络安全配置自动生成系统 - Google Patents
基于遗传算法的网络安全配置自动生成系统 Download PDFInfo
- Publication number
- CN109274539A CN109274539A CN201811350174.5A CN201811350174A CN109274539A CN 109274539 A CN109274539 A CN 109274539A CN 201811350174 A CN201811350174 A CN 201811350174A CN 109274539 A CN109274539 A CN 109274539A
- Authority
- CN
- China
- Prior art keywords
- network
- information
- configuration
- individual
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000002068 genetic effect Effects 0.000 title claims abstract description 46
- 239000011159 matrix material Substances 0.000 claims abstract description 43
- 230000006870 function Effects 0.000 claims description 25
- 230000035772 mutation Effects 0.000 claims description 18
- 238000000034 method Methods 0.000 claims description 17
- 108090000623 proteins and genes Proteins 0.000 claims description 17
- 210000000349 chromosome Anatomy 0.000 claims description 10
- 238000005457 optimization Methods 0.000 claims description 10
- 230000002265 prevention Effects 0.000 claims description 7
- 238000000605 extraction Methods 0.000 claims description 4
- 230000009466 transformation Effects 0.000 claims description 3
- 230000007704 transition Effects 0.000 claims description 3
- 238000005316 response function Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 230000005764 inhibitory process Effects 0.000 description 3
- 235000013399 edible fruits Nutrition 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 210000004940 nucleus Anatomy 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0876—Aspects of the degree of configuration automation
- H04L41/0886—Fully automatic configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Pure & Applied Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811350174.5A CN109274539B (zh) | 2018-11-14 | 2018-11-14 | 基于遗传算法的网络安全配置自动生成系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811350174.5A CN109274539B (zh) | 2018-11-14 | 2018-11-14 | 基于遗传算法的网络安全配置自动生成系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109274539A true CN109274539A (zh) | 2019-01-25 |
CN109274539B CN109274539B (zh) | 2019-08-13 |
Family
ID=65193616
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811350174.5A Active CN109274539B (zh) | 2018-11-14 | 2018-11-14 | 基于遗传算法的网络安全配置自动生成系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109274539B (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112039843A (zh) * | 2020-07-24 | 2020-12-04 | 中国人民解放军陆军工程大学 | 基于矩阵补全的用户多域权限联合估计方法 |
CN113852608A (zh) * | 2021-09-02 | 2021-12-28 | 中国人民解放军63891部队 | 一种基于基因式的防火墙规则异常处理优化方法 |
CN114070655A (zh) * | 2022-01-18 | 2022-02-18 | 北京领御中安科技有限公司 | 网络流量检测规则生成方法及装置、电子设备、存储介质 |
CN115150152A (zh) * | 2022-06-30 | 2022-10-04 | 中国人民解放军陆军工程大学 | 基于权限依赖图缩减的网络用户实际权限快速推理方法 |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1311880A (zh) * | 1998-07-31 | 2001-09-05 | 特许科技有限公司 | 采用人造神经网络和遗传算法的高速公路事件自动检测系统 |
US20060265324A1 (en) * | 2005-05-18 | 2006-11-23 | Alcatel | Security risk analysis systems and methods |
CN101145219A (zh) * | 2007-07-20 | 2008-03-19 | 周远成 | 使用遗传算法进行资源配置子系统 |
CN101854337A (zh) * | 2009-04-03 | 2010-10-06 | 深圳大学 | 基于安全和服务质量对网络进行优化控制的系统及方法 |
CN102098306A (zh) * | 2011-01-27 | 2011-06-15 | 北京信安天元科技有限公司 | 基于关联矩阵的网络攻击路径分析方法 |
CN102204170A (zh) * | 2008-10-31 | 2011-09-28 | 惠普开发有限公司 | 用于网络入侵检测的方法和设备 |
CN103581188A (zh) * | 2013-11-05 | 2014-02-12 | 中国科学院计算技术研究所 | 一种网络安全态势预测方法及系统 |
CN103903073A (zh) * | 2014-04-23 | 2014-07-02 | 河海大学 | 一种含分布式电源及储能的微电网优化规划方法及系统 |
CN107222491A (zh) * | 2017-06-22 | 2017-09-29 | 北京工业大学 | 一种基于工业控制网络变种攻击的入侵检测规则创建方法 |
CN107294775A (zh) * | 2017-06-08 | 2017-10-24 | 国网江西省电力公司信息通信分公司 | 基于层次分析法和遗传算法的通信网优化方法 |
-
2018
- 2018-11-14 CN CN201811350174.5A patent/CN109274539B/zh active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1311880A (zh) * | 1998-07-31 | 2001-09-05 | 特许科技有限公司 | 采用人造神经网络和遗传算法的高速公路事件自动检测系统 |
US20060265324A1 (en) * | 2005-05-18 | 2006-11-23 | Alcatel | Security risk analysis systems and methods |
CN101145219A (zh) * | 2007-07-20 | 2008-03-19 | 周远成 | 使用遗传算法进行资源配置子系统 |
CN102204170A (zh) * | 2008-10-31 | 2011-09-28 | 惠普开发有限公司 | 用于网络入侵检测的方法和设备 |
CN101854337A (zh) * | 2009-04-03 | 2010-10-06 | 深圳大学 | 基于安全和服务质量对网络进行优化控制的系统及方法 |
CN102098306A (zh) * | 2011-01-27 | 2011-06-15 | 北京信安天元科技有限公司 | 基于关联矩阵的网络攻击路径分析方法 |
CN103581188A (zh) * | 2013-11-05 | 2014-02-12 | 中国科学院计算技术研究所 | 一种网络安全态势预测方法及系统 |
CN103903073A (zh) * | 2014-04-23 | 2014-07-02 | 河海大学 | 一种含分布式电源及储能的微电网优化规划方法及系统 |
CN107294775A (zh) * | 2017-06-08 | 2017-10-24 | 国网江西省电力公司信息通信分公司 | 基于层次分析法和遗传算法的通信网优化方法 |
CN107222491A (zh) * | 2017-06-22 | 2017-09-29 | 北京工业大学 | 一种基于工业控制网络变种攻击的入侵检测规则创建方法 |
Non-Patent Citations (1)
Title |
---|
ALIREZA TAMJIDYAMCHOLO: "Information Security Risk Reduction Based on Genetic Algorithm", 《IEEE》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112039843A (zh) * | 2020-07-24 | 2020-12-04 | 中国人民解放军陆军工程大学 | 基于矩阵补全的用户多域权限联合估计方法 |
CN112039843B (zh) * | 2020-07-24 | 2024-02-02 | 中国人民解放军陆军工程大学 | 基于矩阵补全的用户多域权限联合估计方法 |
CN113852608A (zh) * | 2021-09-02 | 2021-12-28 | 中国人民解放军63891部队 | 一种基于基因式的防火墙规则异常处理优化方法 |
CN113852608B (zh) * | 2021-09-02 | 2024-03-19 | 中国人民解放军63891部队 | 一种基于基因式的防火墙规则异常处理优化方法 |
CN114070655A (zh) * | 2022-01-18 | 2022-02-18 | 北京领御中安科技有限公司 | 网络流量检测规则生成方法及装置、电子设备、存储介质 |
CN115150152A (zh) * | 2022-06-30 | 2022-10-04 | 中国人民解放军陆军工程大学 | 基于权限依赖图缩减的网络用户实际权限快速推理方法 |
CN115150152B (zh) * | 2022-06-30 | 2024-04-26 | 中国人民解放军陆军工程大学 | 基于权限依赖图缩减的网络用户实际权限快速推理方法 |
Also Published As
Publication number | Publication date |
---|---|
CN109274539B (zh) | 2019-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109274539B (zh) | 基于遗传算法的网络安全配置自动生成系统 | |
Kesarwani et al. | Development of trust based access control models using fuzzy logic in cloud computing | |
Abusorrah et al. | Minimax-regret robust defensive strategy against false data injection attacks | |
CN104683362B (zh) | 一种细粒度隐私安全的访问控制系统及其访问控制方法 | |
Tapas et al. | Experimenting with smart contracts for access control and delegation in IoT | |
CN109302310B (zh) | 一种网络运维脆弱性分析方法 | |
CN110046890A (zh) | 一种区块链权限管理系统及方法 | |
Fraga et al. | A taxonomy of trust and reputation system attacks | |
Hana | E-government cloud computing proposed model: Egyptian E_Government Cloud Computing | |
Smirnov et al. | Context-based access control model for smart space | |
Zhang et al. | A graph‐theoretic approach to stability of neutral stochastic coupled oscillators network with time‐varying delayed coupling | |
CN106487770A (zh) | 鉴权方法及鉴权装置 | |
CN108366068A (zh) | 一种软件定义网络下基于策略语言的云端网络资源管理控制系统 | |
Bhogal et al. | A review on big data security and handling | |
Zhang et al. | Tag-Based Trust Evaluation In Zero Trust Architecture | |
Sanjeevi et al. | The improved DROP security based on hard AI problem in cloud | |
Khalil et al. | IoT-MAAC: Multiple attribute access control for IoT environments | |
Chatterjee et al. | An efficient fine grained access control scheme based on attributes for enterprise class applications | |
Shi et al. | Continuous trust evaluation of power equipment and users based on risk measurement | |
Nguyen et al. | ADSynth: Synthesizing Realistic Active Directory Attack Graphs | |
Namane et al. | Grid and cloud computing security: A comparative survey | |
Pampattiwar et al. | CBSOACH: design of an efficient consortium blockchain-based selective ownership and access control model with vulnerability resistance using hybrid decision engine | |
Yahya et al. | Multi-organizational access control model based on mobile agents for cloud computing | |
Groš | Complex systems and risk management | |
Rathi et al. | Rule based trust evaluation using fuzzy logic in cloud computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Bai Wei Inventor after: Pan Zhisong Inventor after: Guo Shize Inventor after: Chen Zhe Inventor after: Wang Cailing Inventor after: Wang Chenyu Inventor after: Xia Shiming Inventor before: Bai Wei Inventor before: Pan Zhisong Inventor before: Guo Shize Inventor before: Chen Zhe Inventor before: Wang Cailing Inventor before: Wang Chenyu Inventor before: Xia Shiming |