Information Security Discrimination Method, System and Related Devices Based on Rough Set Theory

A technology of rough set theory and information security, applied in the field of information security discrimination based on rough set theory, and computer readable storage media, can solve the problems of low verification efficiency, inability to timely and accurately feedback security status, and adaptability to industrial application scenarios Poor and other problems, to achieve the effect of improving verification efficiency, reducing time complexity, and reducing verification time-consuming

Active Publication Date: 2021-08-13
GUANGDONG UNIV OF TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, for very large and complex actual industrial application scenarios, the verification efficiency is very low or even unable to effectively deal with the verification problem of the opacity of the actual system, and it is impossible to timely and accurately feedback the specific security status of the information that needs to be kept secret in the system. Poor adaptability to modern industrial application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information Security Discrimination Method, System and Related Devices Based on Rough Set Theory
  • Information Security Discrimination Method, System and Related Devices Based on Rough Set Theory
  • Information Security Discrimination Method, System and Related Devices Based on Rough Set Theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0117] Combine the following Figure 11 , Figure 11 A flowchart of a method for discriminating information security based on rough set theory provided in the embodiment of the present application, which specifically includes the following steps:

[0118] S101: respectively perform an appreciable transition optimization operation on the first event string and the second event string constructed according to the target discrete event system, and correspondingly obtain a first generator and a second generator;

[0119] Among them, the first event string contains information that needs to be concealed, and the second event string is a cover event string of the first event string, that is, the ultimate goal is to prevent other people from being able to accurately distinguish the information that needs to be concealed (need to be kept secret) in which event. In the string, in the case of uncertainty, it can be considered that the information that needs to be concealed is kept secr...

Embodiment 2

[0135] Combine the following Figure 12 , Figure 12 A flow chart of a method for judging whether there is opacity and the degree of opacity between the first event string and the second time string in the information security judging method provided by the embodiment of the present application, on the basis of the first embodiment, is given. A specific way of judging opacity and the degree of opacity, the specific steps are as follows:

[0136] S201: Determine the event string to which it belongs according to the decision attribute corresponding to each event path included in the decision table, and obtain the event path set of the first event string and the event path set of the second event string;

[0137] S202: Determine whether there is a consistent event path in the event path sets corresponding to the first event string and the second event string respectively;

[0138] S203: Determine that there is no opacity between the first event string and the second event strin...

Embodiment 3

[0148] Aiming at the opacity of discrete event systems, this embodiment proposes a method for processing the opacity verification of discrete event systems using rough set theory as a knowledge extraction tool: first formalize the opacity of discrete event systems, and then use rough sets The theory expresses the discrete event system in the form of information table and decision table, obtains a necessary and sufficient condition about the opacity of discrete event system, and gives an algorithm to verify the opacity of discrete event system, which realizes the opacity of the system. Validation of:

[0149] 1. According to the discrete event system G=(∑, X, δ, ψ, x 0 , X m ), first construct the automaton of L and K:

[0150] Knowing L, First construct an automaton for L: G 1 =(∑, X 1 ,δ 1 , ψ 1 , x 10 , X 1m ), where L m (G 1 ) = L, for all x 1 ∈X 1 , ψ 1 (x 1 ) = ∑. To determine G 1 , one can choose to base G on G 1 After optimization, the results are as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application discloses an information security discrimination method based on rough set theory, which is applied to discrete event systems, combines rough set theory with discrete event systems, and uses rough set theory as a tool for knowledge extraction from discrete event systems. To verify whether the discrete event system is opaque by constructing a finite state machine information system and a decision table, it is different from the exponential time complexity of the existing language-based opacity verification method, and the special knowledge extraction method based on rough set theory can be Effectively reducing the time complexity of verification can greatly reduce the time-consuming verification and improve the verification efficiency, so as to timely feedback the security status of the information that needs to be kept secret in the system, and also broaden the application scenarios of rough set theory to the field of opacity verification. The present application also discloses an information security judgment system, device and computer-readable storage medium based on rough set theory, which have the beneficial effects mentioned above.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular, to an information security discrimination method, system, device and computer-readable storage medium based on rough set theory. Background technique [0002] Discrete Event System (abbreviated as DES) is a kind of dynamic system whose state evolves due to the interaction of discrete events according to certain operating rules. For the system modeling after discretization of continuous systems, it has been widely used in computer integrated manufacturing systems, traffic control, computer networks, communication networks, flexible production lines, military command and other fields. [0003] In recent years, the research on the opacity of discrete event systems has attracted extensive attention from many scholars at home and abroad. Opacity means that the system has the following characteristics: For any path to the secret state of the system, there is at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/71G06F9/448
CPCG06F21/71G06F9/4498
Inventor 刘富春赵毅澎赵锐
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products