Time filter

Source Type

Huang H.,University of Science and Technology Beijing | Huang H.,Information Classified Security Protection Evaluation Center | Liu Z.-L.,National Defense University | Yu D.-T.,University of Science and Technology Beijing | Zhou S.-H.,Beijing Institute of Technology
Binggong Xuebao/Acta Armamentarii | Year: 2010

The model of data classification and protection is proposed by combining ontology knowledge with immune selection. The knowledge ontology of classification is set up from the point of view of business processes, and the immunity characters are used to identify the properties of the ontology data, the data is intelligently classified by using the rules, so that different protective measures are taken. Besides the rules have optimized by immune algorithm so that the rules have more practicality and adaptability. At the end, a power system of a province is taken for an example. The results show that the model is reasonable and provides a new way of protective data.


Huang H.,University of Science and Technology Beijing | Huang H.,Information Classified Security Protection Evaluation Center | Liu Z.-L.,National Defense University | Yu D.-T.,University of Science and Technology Beijing
Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology | Year: 2010

To evaluate reasonably the ability of protection system, the requirements of evaluation standard GB/T 22239-2008 and information security events have to be considered and analyzed comprehensively. The fault tree is applied to decomposition of security incidents and the minimal cut set of fault tree can be translated into inference rules. Then, the uncertain reasoning technique is used to derive security incidents caused probably by system vulnerability. The loss and risk are taken into account, which could be regarded as the basis to assess the capacity of protection system. Experimental results show that the performance of proposed model is corresponding to the system vulnerability and the judgment of classified assessment is reasonable. Above work provides a possible route to synthesize the search of classified protection and risk analysis.


Huang H.,University of Science and Technology Beijing | Huang H.,Information Classified Security Protection Evaluation Center | Liu Z.-L.,National Defense University | Yu D.-T.,University of Science and Technology Beijing
Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology | Year: 2011

A model of data classification and protection is proposed by combination of knowledge ontology and rough set theories. Firstly, the data is classified in accordance with the business processes, and the knowledge ontology of classification is set up. And then, reduction of the attribute of the data is made by using rough set theories, and intelligent classification of the reduced data by using of the rules is done. Different protective measures are taken to different classification data. Furthermore, rough set theories are used to find rules from the historic data, and the knowledge ontology is studied. Finally, an experiment on a power system of a province is done as an example. The results show that the model can reasonably classify the data by the characteristics of different organizations.


Tao Y.,University of Science and Technology Beijing | Tao Y.,Information Classified Security Protection Evaluation Center | Liu Z.,National Defense University | Zhang Z.,University of Science and Technology Beijing | And 2 more authors.
Gaojishu Tongxin/Chinese High Technology Letters | Year: 2010

The network attack situation niching model is presented by using the factors neural networks theory, so that the overall performance of the target network is analyzed from the attack and formalization angles. The model is carried out by three steps, which are the attack situation extraction, the attack situation comprehension and the attack situation demonstrates. And three return are obtain from these steps, which are the factors rattan of attack situation, the factors net of attack situation and the situation niching map. At last, the simulation experiments are carried on, and three maps are presented, which are the attacks progress situation niching map, the attacks success situation niching map and the attacks failing situation niching map. The results prove that the network attack situation niching model is useful for simulation research and training of network attack.

Loading Information Classified Security Protection Evaluation Center collaborators
Loading Information Classified Security Protection Evaluation Center collaborators