检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:周银萍 王跟成 ZHOU Yin-ping;WANG Gen-cheng(Network Information Technology Center,Xizang Minzu University,Xianyang Shaanxi 712000,China)
机构地区:[1]西藏民族大学网络信息技术中心,陕西咸阳712000
出 处:《计算机仿真》2022年第9期451-455,共5页Computer Simulation
基 金:全国教育信息技术研究课题(立项号:186130016,课题编号:9265)。
摘 要:利用当前方法对移动互联网敏感信息安全检索时,忽略了对敏感信息的提取,不同类别的索引信息检索效率低、信息的正确检索量偏少。现提出多阶段攻击下移动互联网敏感信息安全检索方法。分析攻击者多阶段攻击行为,并以此为基础提取攻击行为下的敏感信息。设置加密密钥,构建贝叶斯网络信息检索模型。将模型中的敏感信息结点重新组成,根据重新组成的敏感信息结构,获取敏感信息权值,完成多阶段攻击下移动互联网敏感信息的安全检索。实验结果表明,所提方法的索引信息检索效率和正确检索数量均较高,验证了提出方法的精度高、安全性较强。In current methods, the extraction of sensitive information on mobile Internet is often ignored. In addition, the retrieval efficiency of different types of index information is low and the amount of correct retrieval is too small. Therefore, a method of secure retrieval for sensitive information on mobile Internet under multi-stage attacks was proposed. At first, the attacker’s behavior of multi-stage attacks was analyzed. on this basis, the sensitive information under the attack behavior was extracted. Moreover, the encryption key was set up, and the Bayesian network information retrieval model was constructed. Furthermore, sensitive information nodes in the model were reconstituted. According to the structure, the weight of reconstituted sensitive information can be obtained. Finally, the secure retrieval of sensitive information on mobile Internet under multi-stage attack was completed. Experimental results show that the retrieval efficiency and correct retrieval quantity of the proposed method are both high. In addition, the method has higher accuracy and security.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.30