计算机应用 ›› 2016, Vol. 36 ›› Issue (9): 2447-2451.DOI: 10.11772/j.issn.1001-9081.2016.09.2447

• 网络空间安全 • 上一篇    下一篇

基于聚类分析的可信网络管理模型

谢洪安1, 李栋2, 苏旸1, 杨凯1   

  1. 1. 武警部队网络与信息安全保密重点实验室, 西安 710086;
    2. 武警工程大学 电子技术系, 西安 710086
  • 收稿日期:2016-02-29 修回日期:2016-03-30 出版日期:2016-09-10 发布日期:2016-09-08
  • 通讯作者: 谢洪安
  • 作者简介:谢洪安(1992-),男,江西南昌人,硕士研究生,主要研究方向:网络安全、可信计算;李栋(1993-),男,四川绵阳人,硕士研究生,主要研究方向:信息技术;苏旸(1975-),男,陕西西安人,教授,博士,CCF会员,主要研究方向:网络安全;杨凯(1983-),男,山东莱芜人,讲师,博士,CCF会员,主要研究方向:网络安全。
  • 基金资助:
    国家自然科学基金资助项目(61402530);陕西省自然科学基金资助项目(2014JQ8301)。

Trusted network management model based on clustering analysis

XIE Hong'an1, LI Dong2, SU Yang1, YANG Kai1   

  1. 1. Key Laboratory of Network and Information Security, Chinese People's Armed Police Force, Xi'an Shaanxi 710086, China;
    2. Department of Electronic Technology, Engineering University of Chinese People's Armed Police Force, Xi'an Shaanxi 710086, China
  • Received:2016-02-29 Revised:2016-03-30 Online:2016-09-10 Published:2016-09-08
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (61402530), the Natural Science Foundation of Shaanxi Province (2014JQ8301).

摘要: 针对可信网络中动态信任模型对终端用户行为信任评估有效性问题,提出一种新的基于聚类分析的可信网络管理模型。该模型在传统信任模型的基础上引入聚类分析方法,从行为预期的角度研究用户的行为信任。通过对用户的历史行为数据进行聚类分析以构建行为预期,并利用行为预期评估用户行为,最后以信任评估结果为依据实现对网络中的用户的管理。实验表明该模型可以对长期接入的正常用户产生稳定的信任评估结果,同时迅速发现并隔离恶意用户,对可信用户与不可信用户有较高的区分度,与传统的信任模型相比具有更高的准确度及效率,达到了提高网络可信性的目的。

关键词: 可信网络, 聚类分析, 信任评估, 网络管理, 信任模型

Abstract: To improve the availability of dynamic trust model in trusted network, a trusted network management model based on clustering analysis was built. Behavior expectations were used to describe the trust of user behavior by introducing clustering analysis to the traditional trust model. Clustering analysis of the user's historical data was used to build behavior expection model, which was used to evaluate user's behaviors. Finally the trust evaluation results were utilized to realize the network user management. The experimental results show that the proposed model can generate trust evaluation results firmly, detect and isolate the malicious users rapidly, it has better accuracy and efficiency than traditional model, basically improving the network reliability.

Key words: trusted network, clustering analysis, trust evaluation, network management, trust model

中图分类号: