信息广域网不可信数据单向隔离可视化仿真  被引量:2

Information wide area network untrusted data one-way isolation visual simulation

在线阅读下载全文

作  者:吴孟璇 蒋天宇 佟胜伟 张利来 WU Meng-xuan;JIANG Tian-yu;JONG Sheng-wei;ZHANG Li-lai(China Agricultural University,Beijing 100000,China;LEETC ,Henan Jiyuan 459000,China;College of Electrical and computer Science,Jilin Architecture University,Jilin Changchun 130118,China)

机构地区:[1]中国农业大学,北京100000 [2]洛阳电子装备试验中心,河南济源459000 [3]吉林建筑大学,吉林长春130118

出  处:《计算机仿真》2019年第8期431-434,458,共5页Computer Simulation

摘  要:针对传统方法数据单向隔离过程中存在隔离率较低、误隔离率较高、数据可用性较差的问题,提出了基于事务关系的信息广域网不可信数据单向隔离可视化方法,该方法依据数据影响关系确定受恶意事务影响的不可信数据集合;当网络子节点收到主节点发来的访问申请时,根据节点级隔离检测协议判断该访问申请数据对象是否已被隔离,并将隔离检测结果以消息的形式发送给网络主节点;如果申请通过则依据可疑失误隔离协议限制数据库可疑事务访问行为,对受恶意事务影响的不可信数据集合执行单向隔离。仿真测试结果表明,提出方法与其他隔离方法相比,具有较高的单向隔离效率,同时在降低信息广域网不可信数据误隔离率的同时,保证了数据的高可用性。Aiming at the problems of low isolation rate, high error isolation rate and poor data availability in the traditional data isolation method, a new visualization method based on transaction relation is proposed for untrusted data isolation in WAN . The method determines the set of untrusted data affected by malicious transactions according to the data influence relation. When the network sub - node receives the access request from the master node, it determines whether the access request data object has been isolated according to the node level isolation detection protocol, and sends the isolation detection result to the network master node in the form of message. If the application is passed, restrict database suspicious transaction access based on the suspicious fault isolation protocol access behavior to perform one - way isolation on an untrusted set of data affected by a malicious transaction. The simulation results show that the proposed method has higher unidirectional isolation efficiency than other isolation methods, and at the same time reduces the false isolation rate of untrusted data in the wide area network (WAN ) and ensures the high availability of the data.

关 键 词:信息广域网 不可信数据 单向隔离 可视化 

分 类 号:TP392[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象