Font Size: a A A

Research On Access Control Of Safety Production Information System Based On Behavior Authentication

Posted on:2022-03-02Degree:MasterType:Thesis
Country:ChinaCandidate:N ChenFull Text:PDF
GTID:2481306524959419Subject:Safety engineering
Abstract/Summary:PDF Full Text Request
With the continuous advancement of Internet information technology in recent years,the society has entered the information age,and information technology has been widely used in various fields of society,and the information construction of coal mine safety production has also been rapidly developed.Modern coal mine enterprises put forward higher requirements for safe production and management decision-making,not only need to prevent and eliminate safety problems such as emergencies and natural disasters in the coal production process,but also need to master the entire safe production process and adopt information technology for the production process.Real-time monitoring and management,building a complete integrated information management system.When enterprises are upgrading the information technology industry,they need to pay special attention to the information security risk perception and protection problems faced by the coal mine industry Internet system composed of the Internet and coal mine production information systems.The safety production information system generates massive amounts of data for use every day.To ensure the normal operation of departments such as enterprise management,operation,and production safety,if the core database of the system is attacked and destroyed by criminals or foreign hostile forces,it will cause serious economic losses within the enterprise.In order to ensure the safety of the safety production information system of coal mine enterprises,it is necessary to establish an access control model that meets the requirements of safety production informatization and improve the overall protection capability of the system.At present,most coal mine safety production management systems in China use role-based access control.The existing access control model usually adopts manual and static authorization,which directly grants permissions to users,which is prone to user account theft and internal user authority abuse.According to the characteristics of the system and the limitations of the existing access control model,this paper proposes an access control based on behavior authentication model,which combines the user behavior authentication method with the existing access control model.It satisfies the requirements of security information system access control,ensures the legitimacy of user login behavior,and enhances the security of the access control system.This article collects users' daily visit behavior data through the coal mine safety production information management system built,and ensures the consistency and integrity of user behavior data through data cleaning,data integration,and data transformation on the original user behavior data.And interpretability,using these processed data to improve the traditional user behavior authentication method,using the chi-square test technology to mine the regular behavior characteristics of the user access data that can describe the user's access habits,and remove the redundancy and irrelevance The characteristics of the behavioral authentication set are better suitable for the construction of Bayesian network classifiers.Finally,the three decision-making principles are used to realize the pre-decision of the visiting users,and they are applied to the DARBAC model,which can effectively strengthen the access The flexibility of control and the overall safety of the system.The main research work completed in this paper is as follows:(1)Propose an improved user behavior authentication method.Combine the characteristics of Bayesian network belief reasoning and user behavior evidence to authenticate user behavior;use Chi-square test to screen out the behavioral characteristics that are important in the Bayesian network calculation process,and proceed according to the correlation between characteristics and categories Reduce dimensionality and improve authentication accuracy;analyze the authentication model to obtain the weight of the user behavior authentication set,and apply it to the behavior authentication algorithm to ensure the safety and reliability of the authentication result.(2)Using the theory of three decision-making methods to authenticate user behaviors when obtaining user behavior information is not comprehensive enough,pre-authenticate some of the acquired behavior characteristics,and identify users to be detected as legitimate users,delayed decision-making users,and illegal users In the three categories,the two decision-making methods are used to further authenticate the delayed decision-making users who continue to obtain the behavior characteristics.While improving the real-time authentication,it overcomes the uncertainty caused by the lack of characteristics in the authentication process,thereby ensuring the behavior Accuracy of certification results.(3)Propose an access control model for coal mine safety production information system based on user behavior authentication.Introduce the user behavior authentication method into the traditional access control model,continuously authenticate the access user behavior,solve the problem of dynamic detection of access user behavior and grant access rights,and improve the security of the access control system.The paper has 13 pictures,14 tables,and 67 references.
Keywords/Search Tags:Information system security, User Behavior Authentication, Chi-Square Inspection, Three Decisions, Access Control System
PDF Full Text Request
Related items