高级检索

    可信网络中用户行为可信的研究

    Research on User Behavior Trust in Trustworthy Network

    • 摘要: 目前网络安全受到严重的挑战,国际研究表明网络安全正向着网络可信方向发展,未来网络安全是增加行为可信的可信网络,它主要包括服务提供者的可信、网络信息传输的可信和终端用户的可信.通过研究用户的行为信任,不仅可以减少或避免与恶意用户交往,而且因为服务提供者与用户之间建立了互信,从而提高了它们合作完成任务的可能性,降低了因不信任带来的监控和防范等额外开销,所以对用户行为可信的研究不仅可以提高网络的安全性而且也可以提高网络的性能.以可信网络中用户行为可信研究为核心,提出了面向可信网络的用户行为信任的评估、预测与控制架构,包括行为信任的可靠评估;满足不同安全与性能需求的灵活的信任预测;基于信任与风险、利益得失的系统访问博弈决策;基于信任的动态的资源访问控制和以信任预防为主,实时监控为辅的异常行为的监控与防范等.并把这些用户行为可信管理机制进行有效组合,实现了动态控制与静态控制,信任与风险的统一,为可信网络的进一步研究提供基础.

       

      Abstract: With the increasing development of the computer network application, network security is facing the heavy challenge. The international research shows that network security is on the way to trustworthy network (TN). Apart from current security mechanism, the future TN adds behavior trust. TN includes the trust of service providers, the trust of the network information transmission and the trust of end-users. Trust based on user behavior not only can reduce or avoid the contact with the malicious user, but also can reduce the monitoring and prevention additional costs for mutual trust between the service providers and users, so research on user behavior trust will not only improve network security, but also improve overall network performance. In this paper, user behavior trust in trustworthy network is discussed. The authors systematically put forward a framework for evaluation, prediction and control of user behaviors, including reliable evaluation of user behavior trust, trust prediction to meet different prediction combinations of performance and security for service providers, trust and risk decision-making based on game theory, the mechanism based on the RBAC(role-based access control) model through the introduction of user behavior trust, simple and effective user behavior monitoring and prevention strategy based on user behavior trust, etc. Through effective combination of these user behavior trust management mechanisms, the unity of static and dynamic control and the unity of trust and risk, are implemented, which will lay the foundation for further study of the trustworthy network.

       

    /

    返回文章
    返回