Information security discrimination method and system based on rough set theory and related device

A rough set theory and information security technology, applied in computer-readable storage media, in the field of information security discrimination based on rough set theory, can solve the problem of low verification efficiency, inability to timely and accurately feedback security status, and adaptability to industrial application scenarios problems such as poor verification, to achieve the effect of improving verification efficiency, reducing time complexity, and reducing verification time.

Active Publication Date: 2018-12-11
GUANGDONG UNIV OF TECH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, for very large and complex actual industrial application scenarios, the verification efficiency is very low or even unable to effectively deal with the verification problem of the opacity of the actua...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security discrimination method and system based on rough set theory and related device
  • Information security discrimination method and system based on rough set theory and related device
  • Information security discrimination method and system based on rough set theory and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0117] Combine the following Figure 11 , Figure 11 A flow chart of an information security discrimination method based on rough set theory provided in the embodiment of the present application, which specifically includes the following steps:

[0118] S101: Execute considerable transition optimization operations on the first event sequence and the second event sequence constructed according to the target discrete event system, respectively, to obtain the first generator and the second generator correspondingly;

[0119] Among them, the first event string contains the information that needs to be concealed, and the second event string is the cover event string of the first event string, that is, the ultimate goal is to prevent others from accurately distinguishing which event the information that needs to be concealed (need to be kept secret) is. In the string, it can be considered that the information that needs to be concealed is kept confidential if it cannot be determine...

Embodiment 2

[0135] The following combination Figure 12 , Figure 12 The flow chart of a method for judging whether there is opacity and the degree of opacity between the first event string and the second time string in the information security judging method provided by the embodiment of the present application, based on the first embodiment, is given A method for specifically judging opacity and the degree of opacity, the specific steps are as follows:

[0136] S201: Determine the event string to which it belongs according to the decision attribute corresponding to each event path contained in the decision table, and obtain the event path set of the first event string and the event path set of the second event string;

[0137] S202: Determine whether there is a consistent event path in the set of event paths respectively corresponding to the first event string and the second event string;

[0138] S203: Determine that there is no opacity between the first event string and the second e...

Embodiment 3

[0148] Aiming at the opacity of the discrete event system, this embodiment proposes a method using rough set theory as a knowledge extraction tool to deal with the verification of the opacity of the discrete event system: first formalize the opacity of the discrete event system, and then use the rough set The theory expresses the discrete event system in the form of information tables and decision tables, and obtains a sufficient and necessary condition for the opacity of the discrete event system, and thus gives an algorithm for verifying the opacity of the discrete event system, realizing the opacity of the system Validation of:

[0149] 1. According to the discrete event system G=(∑, X, δ, ψ, x 0 , X m ), first construct the automaton of L and K:

[0150] Known L, Construct the automaton of L first: G 1 =(∑,X 1 ,δ 1 , ψ 1 , x 10 , X 1m ), where L m (G 1 ) = L, for all x 1 ∈X 1 , ψ 1 (x 1 ) = ∑. In order to determine G 1 Substantial transfer of , one can ch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses an information security discrimination method based on a rough set theory, the method being applied to a discrete event system. A rough set theory is combined with the discrete event system, the rough set theory is taken as a tool to extract knowledge from the discrete event system, and the opacity of the discrete event system is verified by constructing the finite state machine information system and decision table. Unlike the exponential time complexity of the existing language-based opacity verification methods, the special knowledge extraction method basedon the rough set theory can effectively reduce the verification time complexity, greatly reduce the verification time consumption and improve the verification efficiency, so as to provide feedback ofthe security situation of the confidential information in the system in time, meanwhile, the application scenario of the rough set theory can be extended to the field of opacity verification. The invention also discloses an information security discrimination system and device based on the rough set theory and a computer-readable storage medium, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to an information security discrimination method, system, device and computer-readable storage medium based on rough set theory. Background technique [0002] Discrete Event System (DES for short) is a kind of dynamic system whose state evolution is caused by the interaction of discrete events according to certain operating rules. It has been widely used in the fields of computer integrated manufacturing system, traffic control, computer network, communication network, flexible production line, military command and so on. [0003] In recent years, the research on the opacity of discrete event systems has attracted the attention of many scholars at home and abroad. Opacity means that the system has the following characteristics: for any path to the secret state of the system, there is at least another path from the same state to the non-transparent state. path...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/71G06F9/448
CPCG06F21/71G06F9/4498
Inventor 刘富春赵毅澎赵锐
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products