Citation: | LI Xin, DUAN Yongcheng, HUANG Shuhua, et al. Construction of network security situation indicator system for video private network[J]. Journal of Beijing University of Aeronautics and Astronautics, 2020, 46(9): 1625-1634. doi: 10.13700/j.bh.1001-5965.2020.0043(in Chinese) |
In view of the lack of a complete set of index system in the current network security situation assessment for video private networks, the article studies the construction of network security situation index system. Firstly, the paper focuses on the research and analysis of the network security risks faced by the video private network; then, combined with the basic evaluation indicators of previous network security situation assessment technology, a network security situation indicator system suitable for video private network is constructed according to the characteristics of video private network; finally, the calculation method of indicator values is given, which lays a foundation for network security situation assessment of video private network. It has certain reference significance for perfecting and enriching the network security situation indicator system for video private network.
[1] |
杨健, 顾涛.公安视频专网安全管理系统的设计与研究[J].网络安全技术与应用, 2017(3):154-155. http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=wlaqjsyyy201703094
YANG J, GU T.Design and research of public security video private network security management system[J].Network Security Technology & Application, 2017(3):154-155(in Chinese). http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=wlaqjsyyy201703094
|
[2] |
汤光华, 曾宪报.构建指标体系的原理与方法[J].河北经贸大学学报, 1997(4):60-62. http://www.cqvip.com/QK/90969X/199704/1002829610.html
TANG G H, ZENG X B.Principles and methods of constructing indicator system[J].Journal of Hebei University of Economics and Trade, 1997(4):60-62(in Chinese). http://www.cqvip.com/QK/90969X/199704/1002829610.html
|
[3] |
李远远.基于粗糙集的指标体系构建及综合评价方法研究[D].武汉: 武汉理工大学, 2009. http://cdmd.cnki.com.cn/Article/CDMD-10497-2009198106.htm
LI Y Y.Research on construction of index system and comprehensive evaluation method based on rough set[D].Wuhan: Wuhan University of Technology, 2009(in Chinese). http://cdmd.cnki.com.cn/Article/CDMD-10497-2009198106.htm
|
[4] |
陈秀真, 郑庆华, 管晓宏, 等.层次化网络安全威胁态势量化评估方法[J].软件学报, 2006, 17(4):885-897. http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=rjxb200604026
CHEN X Z, ZHENG Q H, GUAN X H, et al.Quantitative hierarchical threat evaluation model for network security[J].Journal of Software, 2006, 17(4):885-897(in Chinese). http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=rjxb200604026
|
[5] |
姚婷婷, 郑庆华, 管晓宏, 等.一种基于主机实时流量的安全评估方法[J].西安交通大学学报, 2006, 40(4):415-419. http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=xajtdxxb200604011
YAO T T, ZHENG Q H, GUAN X H, et al.Security evaluation method based on host realtime traffic of hosts[J].Journal of Xi'an Jiaotong University, 2006, 40(4):415-419(in Chinese). http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=xajtdxxb200604011
|
[6] |
张建锋.网络安全态势评估若干关键技术研究[D].长沙: 国防科学技术大学, 2013. http://cdmd.cnki.com.cn/Article/CDMD-90002-1014048393.htm
ZHANG J F.Research on key technologies of network security assessment[D].Changsha: National University of Defense Science and Technology, 2013(in Chinese). http://cdmd.cnki.com.cn/Article/CDMD-90002-1014048393.htm
|
[7] |
王志平.基于指标体系的网络安全态势评估研究[D].长沙: 国防科学技术大学, 2010. https://kns.cnki.net/KCMS/detail/detail.aspx?dbcode=CMFD&filename=1011279748.nh
WANG Z P.Research on network security situation evaluation based on index system[D].Changsha: National University of Defense Science and Technology, 2010(in Chinese). https://kns.cnki.net/KCMS/detail/detail.aspx?dbcode=CMFD&filename=1011279748.nh
|
[8] |
李远征.基于指标体系的电子政务外网安全态势评估研究[D].长沙: 国防科学技术大学, 2011. http://cdmd.cnki.com.cn/Article/CDMD-90002-1012020422.htm
LI Y Z.Research on situation evaluation of E-government extranet based on index system[D].Changsha: National University of Defense Science and Technology, 2011(in Chinese). http://cdmd.cnki.com.cn/Article/CDMD-90002-1012020422.htm
|
[9] |
夏冰.网络安全法和网络安全等级保护2.0[M].北京:电子工业出版社, 2017. https://baike.baidu.com/item/%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E6%B3%95%E5%92%8C%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E7%AD%89%E7%BA%A7%E4%BF%9D%E6%8A%A42.0/22179793?fr=aladdin
XIA B.Cyber security law and cyber security level protection 2.0[M].Beijing:Electronic Industry Press, 2017(in Chinese). https://baike.baidu.com/item/%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E6%B3%95%E5%92%8C%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E7%AD%89%E7%BA%A7%E4%BF%9D%E6%8A%A42.0/22179793?fr=aladdin
|
[10] |
李晨.基于模糊层次分析法的舰艇编队通信网络安全管理评估指标体系[J].兵器装备工程学报, 2017, 38(11):134-137. http://www.zhangqiaokeyan.com/academic-journal-cn_journal-sichuan-armed-forces_thesis/0201227223780.html
LI C.Fleet formation's communication network safety management evaluation targets system based on FAHP[J].Journal of Ordnance Equipment Engineering, 2017, 38(11):134-137(in Chinese). http://www.zhangqiaokeyan.com/academic-journal-cn_journal-sichuan-armed-forces_thesis/0201227223780.html
|
[11] |
费军, 余丽华.基于模糊层次分析法的计算机网络安全评价[J].计算机应用与软件, 2011, 28(10):120-123. http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=jsjyyyrj201110034
FEI J, YU L H.Computer network security assessment with fuzzy analytic hierarchy process[J].Computer Applications and Software, 2011, 28(10):120-123(in Chinese). http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=jsjyyyrj201110034
|
[12] |
岳丽.基于指标体系的网络安全态势感知技术研究[D].天津: 天津理工大学, 2016. http://cdmd.cnki.com.cn/Article/CDMD-10060-1016105240.htm
YUE L.Research on network security situation awareness technology based on index system[D].Tianjin: Tianjin University of Technology, 2016(in Chinese). http://cdmd.cnki.com.cn/Article/CDMD-10060-1016105240.htm
|
[13] |
ANDERSON H.Nessus, Part 3: Analysing reports[EB/OL].(2004-02-03)[2020-02-20].http://apachepersonal.miun.se/~janjon/oldcourse/dtab80/lab/lab2/nessus_3.pdf.
|
[14] |
邵旭东, 樊志杰.视频安全接入的关键技术研究[J].信息网络安全, 2012(8):191-194. http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=xxwlaq201208062
SHAO X D, FAN Z J.The research of the key technology of video security access[J].Netinfo Security, 2012(8):191-194(in Chinese). http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=xxwlaq201208062
|
[15] |
杜威, 邹先霞.基于网络的城市治安视频监控系统信息安全机制设计与应用[J].信息网络安全, 2013(10):127-129. http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=xxwlaq201310044
DU W, ZOU X X.Design and application of the city security video surveillance system's information security based on network[J].Netinfo Security, 2013(10):127-129(in Chinese). http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=xxwlaq201310044
|