Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming

نویسندگان

چکیده

In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to Internet violation regulations, cross-use mobile storage media, and poor security management intranets, which main reasons for leaks. Therefore, it is great significance study physical isolation protection technology classified information systems. Physical important part systems, cuts off possibility unauthorized outflow from network environment. To achieve environment build a safe reliable network, necessary continuously improve level construction strengthen capabilities. At present, realization mainly relies on products such as firewall, intrusion detection, illegal outreach, host monitoring, auditing. This analyzes systems scanning, firewall. Establishing model based vulnerabilities making up hidden dangers caused by holes generally passive system. leader behavior—human behavior—needs be constrained according requirements system monitoring. Accordingly, this proposes monitoring computer involving computer. The can analyze, monitor, manage, process behavior terminal local area purpose reducing risks Based evaluation value sequence, initial prediction sequence obtained sliding adaptive triple exponential smoothing method. time-varying weighted Markov chain used error prediction, corrected, accuracy situation improved. According complete, safe, reliable, controllable constructed, existing loopholes eliminated greatest extent possible. enables confidentiality, integrity, availability confidential data reliably protected.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computer Information System Construction Based on Information System Security Level and Structure Model

Objective: with the development of information technology, computer information system has become the lifeblood of the national institutions and the pillar of the social activities, so the information security is particularly important. Methods: in this paper, according to the level and structure of information security model, it is proposed based on the host, network, facilities, and methods s...

متن کامل

Research of Distributed Algorithm based on Parallel Computer Cluster System

Parallel computer cluster technology is an important development direction of high-performance parallel computer system. Parallel computer system is the best choice in institution, which has the high frequent operation requirement. This paper gives the ideal scheme based on the analysis for the complex degree of common distributed algorithm, and points out the advantages of distributed algorith...

متن کامل

A Data Parallel Programming Model Based on Distributed Objects

This paper proposes a data parallel programming model suitable for loosely synchronous, irregular applications. At the core of the model are distributed objects that express non-trivial data parallelism. Sequential objects express independent computations. The goal is to use objects to fold synchronization into data accesses and thus, free the user from concurrency aspects. Distributed objects ...

متن کامل

mortality forecasting based on lee-carter model

over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...

15 صفحه اول

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematical Problems in Engineering

سال: 2022

ISSN: ['1026-7077', '1563-5147', '1024-123X']

DOI: https://doi.org/10.1155/2022/3141568