Font Size: a A A

Research On Identification Methods Of Key Assets In Cyberspace

Posted on:2019-11-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y Z HanFull Text:PDF
GTID:2428330611493564Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
The cyberspace is intertwined and stacked by many different network layers.It can be described from three levels: physical,logical and user entities.How to identify the key assets is of great significance to the understanding of the entire cyberspace.In this paper,the three components of cyberspace are given definitions for key assets in different levels,and corresponding research is carried out.For the identification of the key link nodes in the physical layer,the definition of the key link nodes is first given,and then an evaluation method based on error reconstruction is proposed.Based on the selected edge nodes as the background nodes,other network nodes are used.The difference between the node and the background node is used as a key identification method.The method is applied to the actual routing topology network.The experimental results show that in the topology network of infrastructure such as routing equipment,the proposed method can effectively mine the nodes that have a great influence on network propagation.For the key assets in the logic layer,a network service is first defined as an asset,and then the service dependency rules are mined through the dependencies between services,and the relationship between services is characterized in the form of high-order networks.It is critically measured under the structure of higher-order networks.The experiment analyzes the traffic data collected from the real isolated office network.The results show that the high-order network dependency mining has certain effects on the identification of key services.For the key data asset identification of the user entity layer,from the perspective of the meta-information of structured data,the vector features are extracted by the extracted data features,and then the neural network is used to learn and model the data of the key level.Finally,the test is performed and set up for verification.The accuracy of classification of key data assets can reach to 99.44%.
Keywords/Search Tags:Cyberspace Security, Higher-Order Network, Machine Learning, Node Criticality
PDF Full Text Request
Related items