CN108764481A - A kind of information security ability evaluating method and system based on mobile terminal behavior - Google Patents
A kind of information security ability evaluating method and system based on mobile terminal behavior Download PDFInfo
- Publication number
- CN108764481A CN108764481A CN201810419424.XA CN201810419424A CN108764481A CN 108764481 A CN108764481 A CN 108764481A CN 201810419424 A CN201810419424 A CN 201810419424A CN 108764481 A CN108764481 A CN 108764481A
- Authority
- CN
- China
- Prior art keywords
- information security
- behavior
- evaluation
- security ability
- evaluating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computing arrangements based on specific mathematical models
- G06N7/02—Computing arrangements based on specific mathematical models using fuzzy logic
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computational Mathematics (AREA)
- Evolutionary Computation (AREA)
- Molecular Biology (AREA)
- Fuzzy Systems (AREA)
- Biomedical Technology (AREA)
- Algebra (AREA)
- Artificial Intelligence (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- General Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
技术领域technical field
本发明实施例涉及信息安全能力评测技术领域,具体涉及一种基于移动终端行为的信息安全能力评测方法及系统。The embodiments of the present invention relate to the technical field of information security capability evaluation, and in particular to a method and system for evaluating information security capability based on mobile terminal behavior.
背景技术Background technique
信息安全能力是科技快速发展过程中必不可少的一项基本能力,移动互联网是通信网和因特网结合的产物,具有无线和便携的特点。移动终端是使用移动互联网的设备,因而移动终端具有开源性和开放性。移动终端设备作为在群众中普及性最高的设备,可以在很大程度上反映用户的信息安全能力。近年来,资金被窃和隐私泄露等安全事件屡见不鲜,严重威胁群众的生命财产安全,为了尽量避免安全事件的发生,需要对信息安全能力进行评测,从而对信息安全能力不足的个体加以引导,提高其信息安全能力。因此,本发明将提供基于移动终端行为的信息安全能力评测方法来评测出个体的信息安全能力,找出薄弱点加以引导,从而提高信息安全能力。Information security capability is an indispensable basic capability in the rapid development of science and technology. The mobile Internet is the product of the combination of communication network and Internet, which has the characteristics of wireless and portable. Mobile terminals are devices that use the mobile Internet, so mobile terminals are open source and open. As the most popular device among the masses, mobile terminal devices can reflect the user's information security capabilities to a large extent. In recent years, security incidents such as stolen funds and privacy leaks have occurred frequently, seriously threatening the safety of people's lives and property. In order to avoid security incidents, it is necessary to evaluate information security capabilities, so as to guide individuals with insufficient information security capabilities and improve its information security capabilities. Therefore, the present invention will provide an information security capability evaluation method based on mobile terminal behavior to evaluate individual information security capabilities, find weak points and guide them, thereby improving information security capabilities.
综观现有的评测技术,通常使用方法可归为三类:Looking at the existing evaluation technologies, the commonly used methods can be classified into three categories:
1.问卷调查法1. Questionnaire survey method
问卷调查法是一种常用的评测用户的信息安全能力的方法,可以设计为开放式、封闭式和量化表应答式,一般使用访问、邮寄和发放等方法进行。问卷调查法的基本原理是选择一个调查的主题,将问卷作为这个主题下需要调查的问题的载体,该方法的核心在于设计调查问卷,问卷设计需要有合理的结构、缜密的逻辑,并且要通俗易懂,不仅要达到将问题传达给被调查者的目的,还要让调查者如实回答。但是问卷调查法主要依靠被调查者的主观回答,缺少客观评判,得到的结果可能与真实情况不符,而且问卷中涉及的知识范围不够广,调查效率不高。Questionnaire survey is a commonly used method for evaluating users' information security capabilities. It can be designed as open, closed, and quantitative form-response, and is generally conducted by interviewing, mailing, and distributing methods. The basic principle of the questionnaire survey method is to choose a survey topic and use the questionnaire as the carrier of the questions that need to be investigated under this topic. The core of this method is to design the questionnaire. The questionnaire design needs to have a reasonable structure, careful logic, and be popular. Easy to understand, not only to achieve the purpose of conveying the questions to the respondents, but also to allow the investigators to answer truthfully. However, the questionnaire survey method mainly relies on the subjective answers of the respondents, lacks objective judgment, and the results obtained may not match the real situation. Moreover, the scope of knowledge involved in the questionnaire is not wide enough, and the survey efficiency is not high.
2.严肃游戏2. Serious Games
严肃游戏是以教学、提供专业技能训练和模拟应用为目的的一种电子游戏,其核心为知识和技能等应用元素。该方法的基本原理是在虚拟现实的场景下对用户进行教育与培养,达到训练技能、提高专业能力和评测其能力的目的。严肃游戏场景立体多变,可以给用户提供接近真实的学习环境,其成本低,效益高,普及性也很强。但是严肃游戏只能针对单项技能进行培训或评测,而信息安全事件发展多变,难以跟上形势发展,另外严肃游戏的开发成本较高。Serious game is a kind of electronic game for the purpose of teaching, providing professional skills training and simulation application, and its core is application elements such as knowledge and skills. The basic principle of this method is to educate and train users in the virtual reality scene, so as to achieve the purpose of training skills, improving professional ability and evaluating their ability. Serious game scenes are three-dimensional and changeable, and can provide users with a learning environment close to the real, with low cost, high benefit, and strong popularity. However, serious games can only be trained or evaluated for a single skill, and the development of information security incidents is changing, making it difficult to keep up with the development of the situation. In addition, the development cost of serious games is relatively high.
3.试题考核3. Test questions assessment
试题考核是在软件开发的基础上,通过试题考核个体的信息安全能力,得到用户的信息安全能力强弱,并在考试结束时给予正向反馈,针对用户的薄弱内容推荐相关主题的学习教材等,指导教育用户与信息安全有关的知识和能力。该方法可以在一定程度上考核个体的信息安全能力,但是很难保证其在日常生活中做到在试题中正确答案所对应的具体的行为。Test questions assessment is on the basis of software development, through the test questions to assess the individual's information security capabilities, to obtain the strength of the user's information security capabilities, and give positive feedback at the end of the test, and recommend learning materials on relevant topics for users' weak content, etc. , guiding and educating users on the knowledge and abilities related to information security. This method can assess the individual's information security ability to a certain extent, but it is difficult to ensure that the individual can perform the specific behavior corresponding to the correct answer in the test questions in daily life.
综上所述,现有的评测方法均难以较好的对信息安全能力进行评测。To sum up, the existing evaluation methods are difficult to better evaluate the information security capability.
发明内容Contents of the invention
为了解决上述技术问题或者至少部分地解决上述技术问题,本发明实施例提供了一种基于移动终端行为的信息安全能力评测方法及系统。In order to solve the above technical problems or at least partly solve the above technical problems, embodiments of the present invention provide a method and system for evaluating information security capabilities based on mobile terminal behavior.
有鉴于此,第一方面,本发明实施例提供一种基于移动终端行为的信息安全能力评测方法,包括:In view of this, in the first aspect, the embodiment of the present invention provides an information security capability evaluation method based on mobile terminal behavior, including:
采集移动终端被用户使用时的行为数据;Collect behavior data when the mobile terminal is used by the user;
将所述行为数据输入到预先构建的信息安全能力模糊综合评测模型,输出与所述行为数据对应的信息安全能力等级。The behavior data is input into the pre-built information security capability fuzzy comprehensive evaluation model, and the information security capability level corresponding to the behavior data is output.
所述信息安全能力模糊综合评测模型的构建,包括:The construction of the information security capability fuzzy comprehensive evaluation model includes:
采集移动终端的多个历史行为数据样本;Collect multiple historical behavior data samples of mobile terminals;
确定历史行为数据样本的安全性,并根据历史行为数据样本的安全性,建立用于评测行为数据安全性的不安全行为评测规则;Determine the security of historical behavior data samples, and establish unsafe behavior evaluation rules for evaluating behavior data security based on the security of historical behavior data samples;
根据所述不安全行为评测规则构建信息安全能力模糊综合评测模型。According to the unsafe behavior evaluation rules, a fuzzy comprehensive evaluation model of information security capability is constructed.
确定历史行为数据样本的安全性,并根据历史行为数据样本的安全性,建立用于评测行为数据安全性的不安全行为评测规则,包括:Determine the security of historical behavior data samples, and establish unsafe behavior evaluation rules for evaluating behavior data security based on the security of historical behavior data samples, including:
获取预设的动态行为条件和静态行为条件;Obtain preset dynamic behavior conditions and static behavior conditions;
根据所述动态行为条件和静态行为条件,将所述历史行为数据样本划分为动态行为数据样本和静态行为数据样本;According to the dynamic behavior conditions and the static behavior conditions, the historical behavior data samples are divided into dynamic behavior data samples and static behavior data samples;
根据先验知识数据库确定所述动态行为数据样本和静态行为数据样本的安全性;determining the security of the dynamic behavior data sample and the static behavior data sample according to the prior knowledge database;
根据动态行为数据样本的安全性和静态行为数据样本的安全性,建立动态不安全行为评测规则和静态不安全行为评测规则。According to the security of dynamic behavior data samples and the security of static behavior data samples, dynamic unsafe behavior evaluation rules and static unsafe behavior evaluation rules are established.
根据所述不安全行为评测规则构建信息安全能力模糊综合评测模型,包括:Construct a fuzzy comprehensive evaluation model of information security capabilities according to the unsafe behavior evaluation rules, including:
根据不安全行为评测规则确定评价指标;Determine the evaluation indicators according to the unsafe behavior evaluation rules;
根据评价指标构建信息安全能力评测指标体系和评测集,所述评测集用于对所述信息安全能力评测指标体系得到的结果进行评价;Constructing an information security capability evaluation index system and an evaluation set according to the evaluation indicators, and the evaluation set is used to evaluate the results obtained by the information security capability evaluation index system;
建立信息安全能力评测指标体系中评测指标的权重集;Establish the weight set of evaluation indicators in the information security capability evaluation index system;
建立信息安全能力评测指标体系中评测指标的隶属度;Establish the membership degree of the evaluation index in the information security capability evaluation index system;
根据所述权重集和隶属度构建模糊综合评价矩阵。A fuzzy comprehensive evaluation matrix is constructed according to the weight set and the degree of membership.
将所述行为数据输入到预先构建的信息安全能力模糊综合评测模型,输出余所述行为数据对应的信息安全能力等级,包括:Input the behavior data into the pre-built information security capability fuzzy comprehensive evaluation model, and output the information security capability level corresponding to the behavior data, including:
将所述行为数据输入到预先构建的信息安全能力模糊综合评测模型,通过信息安全能力评测指标体系计算得到信息安全能力指数;Input the behavior data into the pre-built information security capability fuzzy comprehensive evaluation model, and calculate the information security capability index through the information security capability evaluation index system;
根据预设的信息安全能力指数与评测集的对应关系,确定信息安全能力级别。According to the corresponding relationship between the preset information security capability index and the evaluation set, determine the information security capability level.
所述评测集的元素包括信息安全能力弱、信息安全能力一般、信息安全能力较强、信息安全能力强四个信息安全能力级别。The elements of the evaluation set include four levels of information security capabilities: weak information security capabilities, general information security capabilities, strong information security capabilities, and strong information security capabilities.
所述行为数据包括:Said behavioral data includes:
通话行为、短信行为、热点连接行为、应用安装行为、应用运行行为、定位行为和网络交互行为。Call behavior, SMS behavior, hotspot connection behavior, application installation behavior, application running behavior, positioning behavior and network interaction behavior.
第二方面,本发明实施例还提供一种基于移动终端行为的信息安全能力评测系统,包括:In the second aspect, the embodiment of the present invention also provides an information security capability evaluation system based on mobile terminal behavior, including:
采集模块,用于采集移动终端被用户使用时的行为数据;The collection module is used to collect behavior data when the mobile terminal is used by the user;
评测模块,用于将所述行为数据输入到预先构建的信息安全能力模糊综合评测模型,输出与所述行为数据对应的信息安全能力等级。An evaluation module, configured to input the behavior data into a pre-built information security capability fuzzy comprehensive evaluation model, and output an information security capability level corresponding to the behavior data.
所述评测模块包括用于构建信息安全能力模糊综合评测模型的建模子模块;The evaluation module includes a modeling sub-module for constructing a fuzzy comprehensive evaluation model of information security capability;
所述建模子模块包括:The modeling submodules include:
采集单元,用于采集移动终端的多个历史行为数据样本;A collection unit, configured to collect a plurality of historical behavior data samples of the mobile terminal;
规则单元,用于确定历史行为数据样本的安全性,并根据历史行为数据样本的安全性,建立用于评测行为数据安全性的不安全行为评测规则;A rule unit is used to determine the security of historical behavior data samples, and establish unsafe behavior evaluation rules for evaluating the security of behavior data according to the security of historical behavior data samples;
建模单元,用于根据所述不安全行为评测规则构建信息安全能力模糊综合评测模型。A modeling unit, configured to construct a fuzzy comprehensive evaluation model of information security capabilities according to the unsafe behavior evaluation rules.
所述规则单元包括:The rule unit includes:
获取子单元,用于获取预设的动态行为条件和静态行为条件;Obtaining subunits for obtaining preset dynamic behavior conditions and static behavior conditions;
划分子单元,用于根据所述动态行为条件和静态行为条件,将所述历史行为数据样本划分为动态行为数据样本和静态行为数据样本;Dividing subunits for dividing the historical behavior data samples into dynamic behavior data samples and static behavior data samples according to the dynamic behavior conditions and static behavior conditions;
确定子单元,用于根据先验知识数据库确定所述动态行为数据样本和静态行为数据样本的安全性;A determination subunit is used to determine the security of the dynamic behavior data samples and the static behavior data samples according to the prior knowledge database;
建立子单元,用于根据动态行为数据样本的安全性和静态行为数据样本的安全性,建立动态不安全行为评测规则和静态不安全行为评测规则。A subunit is established for establishing dynamic unsafe behavior evaluation rules and static unsafe behavior evaluation rules according to the security of dynamic behavior data samples and the security of static behavior data samples.
第三方面,本发明实施例还提出一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行如第一方面所述方法的步骤。In the third aspect, the embodiment of the present invention also proposes a non-transitory computer-readable storage medium, the non-transitory computer-readable storage medium stores computer instructions, and the computer instructions cause the computer to execute the computer described in the first aspect. method steps.
相比现有技术,本发明实施例提出的一种基于移动终端行为的信息安全能力评测方法,通过根据移动终端在用户使用时的行为数据,对用户信息安全能力进行评测,解决了现有信息安全能力评测方法的单一性和评价全面性不足的问题,重点考虑了客观行为对本体分析的重要性,使得信息安全能力评测结果跟真实可靠;Compared with the existing technology, an information security capability evaluation method based on mobile terminal behavior proposed by the embodiment of the present invention solves the problem of existing information security by evaluating the user information security capability according to the behavior data of the mobile terminal when the user uses it. The singleness of the security capability evaluation method and the lack of comprehensiveness of the evaluation focused on the importance of objective behavior for ontology analysis, making the information security capability evaluation results authentic and reliable;
相比于问卷调查法,本发明采集用户移动终端的行为数据,增加客观评判,得到的结果会更接近真实情况,效率较高;Compared with the questionnaire survey method, the present invention collects the behavior data of the user's mobile terminal, increases the objective judgment, and the obtained result will be closer to the real situation, and the efficiency is higher;
相比于严肃游戏,本发明采集多层次移动终端数据,涉及范围广,实时性强,切实反映当前状态用户的信息安全能力且成本低;Compared with serious games, the present invention collects multi-level mobile terminal data, which involves a wide range, strong real-time performance, effectively reflects the user's information security capabilities in the current state, and has low cost;
相比于试题考核,本发明能基于用户的行为对信息安全能力做出评测,而不是只依靠主观答题,准确性更高。Compared with examination questions, the present invention can evaluate information security capabilities based on user behavior, instead of relying on subjective answers, and has higher accuracy.
附图说明Description of drawings
为了更清楚地说明本发明实施例的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the following will briefly introduce the accompanying drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only some of the present invention. Embodiments, for those of ordinary skill in the art, other drawings can also be obtained according to these drawings without paying creative labor.
图1为本发明提供的一种基于移动终端行为的信息安全能力评测方法方法的流程图;Fig. 1 is a flow chart of a method for evaluating information security capabilities based on mobile terminal behavior provided by the present invention;
图2为本发明实施例提供的一种基于移动终端行为的信息安全能力评测系统示意图。FIG. 2 is a schematic diagram of an information security capability evaluation system based on mobile terminal behavior provided by an embodiment of the present invention.
具体实施方式Detailed ways
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明的一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
如图1所示,图1为本发明提供的一种基于移动终端行为的信息安全能力评测方法,可包括以下步骤:As shown in Figure 1, Figure 1 is a method for evaluating information security capabilities based on mobile terminal behavior provided by the present invention, which may include the following steps:
采集移动终端被用户使用时的行为数据;Collect behavior data when the mobile terminal is used by the user;
将所述行为数据输入到预先构建的信息安全能力模糊综合评测模型,输出与所述行为数据对应的信息安全能力等级。The behavior data is input into the pre-built information security capability fuzzy comprehensive evaluation model, and the information security capability level corresponding to the behavior data is output.
所述信息安全能力模糊综合评测模型的构建,包括:The construction of the information security capability fuzzy comprehensive evaluation model includes:
采集移动终端的多个历史行为数据样本;Collect multiple historical behavior data samples of mobile terminals;
确定历史行为数据样本的安全性,并根据历史行为数据样本的安全性,建立用于评测行为数据安全性的不安全行为评测规则;Determine the security of historical behavior data samples, and establish unsafe behavior evaluation rules for evaluating behavior data security based on the security of historical behavior data samples;
根据所述不安全行为评测规则构建信息安全能力模糊综合评测模型。According to the unsafe behavior evaluation rules, a fuzzy comprehensive evaluation model of information security capability is constructed.
确定历史行为数据样本的安全性,并根据历史行为数据样本的安全性,建立用于评测行为数据安全性的不安全行为评测规则,包括:Determine the security of historical behavior data samples, and establish unsafe behavior evaluation rules for evaluating behavior data security based on the security of historical behavior data samples, including:
获取预设的动态行为条件和静态行为条件;Obtain preset dynamic behavior conditions and static behavior conditions;
根据所述动态行为条件和静态行为条件,将所述历史行为数据样本划分为动态行为数据样本和静态行为数据样本;According to the dynamic behavior conditions and the static behavior conditions, the historical behavior data samples are divided into dynamic behavior data samples and static behavior data samples;
根据先验知识数据库确定所述动态行为数据样本和静态行为数据样本的安全性;determining the security of the dynamic behavior data sample and the static behavior data sample according to the prior knowledge database;
根据动态行为数据样本的安全性和静态行为数据样本的安全性,建立动态不安全行为评测规则和静态不安全行为评测规则。According to the security of dynamic behavior data samples and the security of static behavior data samples, dynamic unsafe behavior evaluation rules and static unsafe behavior evaluation rules are established.
根据所述不安全行为评测规则构建信息安全能力模糊综合评测模型,包括:Construct a fuzzy comprehensive evaluation model of information security capabilities according to the unsafe behavior evaluation rules, including:
根据不安全行为评测规则确定评价指标;Determine the evaluation indicators according to the unsafe behavior evaluation rules;
根据评价指标构建信息安全能力评测指标体系和评测集,所述评测集用于对所述信息安全能力评测指标体系得到的结果进行评价;Constructing an information security capability evaluation index system and an evaluation set according to the evaluation indicators, and the evaluation set is used to evaluate the results obtained by the information security capability evaluation index system;
建立信息安全能力评测指标体系中评测指标的权重集;Establish the weight set of evaluation indicators in the information security capability evaluation index system;
建立信息安全能力评测指标体系中评测指标的隶属度;Establish the membership degree of the evaluation index in the information security capability evaluation index system;
根据所述权重集和隶属度构建模糊综合评价矩阵。A fuzzy comprehensive evaluation matrix is constructed according to the weight set and the degree of membership.
将所述行为数据输入到预先构建的信息安全能力模糊综合评测模型,输出余所述行为数据对应的信息安全能力等级,包括:Input the behavior data into the pre-built information security capability fuzzy comprehensive evaluation model, and output the information security capability level corresponding to the behavior data, including:
将所述行为数据输入到预先构建的信息安全能力模糊综合评测模型,通过信息安全能力评测指标体系计算得到信息安全能力指数;Input the behavior data into the pre-built information security capability fuzzy comprehensive evaluation model, and calculate the information security capability index through the information security capability evaluation index system;
根据预设的信息安全能力指数与评测集的对应关系,确定信息安全能力级别。According to the corresponding relationship between the preset information security capability index and the evaluation set, determine the information security capability level.
所述评测集的元素包括信息安全能力弱、信息安全能力一般、信息安全能力较强、信息安全能力强四个信息安全能力级别。The elements of the evaluation set include four levels of information security capabilities: weak information security capabilities, general information security capabilities, strong information security capabilities, and strong information security capabilities.
所述行为数据包括:Said behavioral data includes:
通话行为、短信行为、热点连接行为、应用安装行为、应用运行行为、定位行为和网络交互行为。Call behavior, SMS behavior, hotspot connection behavior, application installation behavior, application running behavior, positioning behavior and network interaction behavior.
基于相同的发明构思,本发明还提供一种基于移动终端行为的信息安全能力评测系统,如图2所示,可以包括:Based on the same inventive concept, the present invention also provides an information security capability evaluation system based on mobile terminal behavior, as shown in Figure 2, which may include:
采集模块,用于采集移动终端被用户使用时的行为数据;The collection module is used to collect behavior data when the mobile terminal is used by the user;
评测模块,用于将所述行为数据输入到预先构建的信息安全能力模糊综合评测模型,输出与所述行为数据对应的信息安全能力等级。An evaluation module, configured to input the behavior data into a pre-built information security capability fuzzy comprehensive evaluation model, and output an information security capability level corresponding to the behavior data.
所述评测模块包括用于构建信息安全能力模糊综合评测模型的建模子模块;The evaluation module includes a modeling sub-module for constructing a fuzzy comprehensive evaluation model of information security capability;
所述建模子模块包括:The modeling submodules include:
采集单元,用于采集移动终端的多个历史行为数据样本;A collection unit, configured to collect a plurality of historical behavior data samples of the mobile terminal;
规则单元,用于确定历史行为数据样本的安全性,并根据历史行为数据样本的安全性,建立用于评测行为数据安全性的不安全行为评测规则;A rule unit is used to determine the security of historical behavior data samples, and establish unsafe behavior evaluation rules for evaluating the security of behavior data according to the security of historical behavior data samples;
建模单元,用于根据所述不安全行为评测规则构建信息安全能力模糊综合评测模型。A modeling unit, configured to construct a fuzzy comprehensive evaluation model of information security capabilities according to the unsafe behavior evaluation rules.
所述规则单元包括:The rule unit includes:
获取子单元,用于获取预设的动态行为条件和静态行为条件;Obtaining subunits for obtaining preset dynamic behavior conditions and static behavior conditions;
划分子单元,用于根据所述动态行为条件和静态行为条件,将所述历史行为数据样本划分为动态行为数据样本和静态行为数据样本;Dividing subunits for dividing the historical behavior data samples into dynamic behavior data samples and static behavior data samples according to the dynamic behavior conditions and static behavior conditions;
确定子单元,用于根据先验知识数据库确定所述动态行为数据样本和静态行为数据样本的安全性;A determination subunit is used to determine the security of the dynamic behavior data samples and the static behavior data samples according to the prior knowledge database;
建立子单元,用于根据动态行为数据样本的安全性和静态行为数据样本的安全性,建立动态不安全行为评测规则和静态不安全行为评测规则。A subunit is established for establishing dynamic unsafe behavior evaluation rules and static unsafe behavior evaluation rules according to the security of dynamic behavior data samples and the security of static behavior data samples.
在一个具体的例子中,In a specific example,
实验数据为2017年8月至2017年12月期间Android 4.4.1系统真机431条行为数据,具体流程为:The experimental data is 431 pieces of behavior data of the Android 4.4.1 system real machine from August 2017 to December 2017. The specific process is as follows:
步骤1,采集移动终端中通话行为、短信行为、热点连接行为、应用安装和运行行为、定位行为和网络流量行为等实验数据。Step 1, collect experimental data such as call behavior, SMS behavior, hotspot connection behavior, application installation and running behavior, positioning behavior and network traffic behavior in mobile terminals.
步骤2,分析采集到的实验数据,建立不安全行为评测规则。Step 2, analyze the collected experimental data, and establish unsafe behavior evaluation rules.
步骤2.1,分析抽象概念对应的静态行为的特征和动态行为中参与者、动态行为和参与者与动态行为之间的关系,将实验数据划分为静态行为数据和动态行为数据。Step 2.1, analyze the characteristics of the static behavior corresponding to the abstract concept and the participants in the dynamic behavior, the dynamic behavior and the relationship between the participant and the dynamic behavior, and divide the experimental data into static behavior data and dynamic behavior data.
步骤2.2,分别寻找静态行为数据和动态行为数据与信息安全能力之间的关系,通过专家咨询和专家学识制定表1所示的不安全行为评测规则。In step 2.2, find the relationship between static behavior data and dynamic behavior data and information security capabilities, and formulate the unsafe behavior evaluation rules shown in Table 1 through expert consultation and expert knowledge.
表1.不安全行为评测规则Table 1. Unsafe behavior evaluation rules
步骤3,构建信息安全能力模糊综合评测模型,评测用户信息安全能力。Step 3: Build a fuzzy comprehensive evaluation model for information security capabilities to evaluate user information security capabilities.
步骤3.1,根据不安全行为评测规则构建信息安全能力评测指标体系,该指标体系包含三个一级指标和十五个二级指标。Step 3.1, build an information security capability evaluation index system according to the unsafe behavior evaluation rules, which includes three first-level indicators and fifteen second-level indicators.
步骤3.2,定义信息安全能力等级评测集为四级信息安全能力级别,评测集V={V1,V2,V3,V4}信息安全能力弱、信息安全能力一般、信息安全能力较强、信息安全能力强},V(V∈{0,1,2,3}),将用户信息安全能力强记为3,信息安全能力较强记为2,信息安全能力一般记为1,信息安全能力弱记为0。Step 3.2, define the information security capability evaluation set as a four-level information security capability level, the evaluation set V = {V 1 , V 2 , V 3 , V 4 } information security capability is weak, information security capability is average, and information security capability is strong , Strong information security capability}, V(V∈{0,1,2,3}), the strong information security capability of users is recorded as 3, the strong information security capability is recorded as 2, the information security capability is generally recorded as 1, and the information security capability is generally recorded as 1. Weak security capability is recorded as 0.
步骤3.3,对一级指标建立判断矩阵,计算权重向量并进行一致性检验,若一致性检验不通过,进行参数修正,将通过一致性检验的值作为一级指标权重。Step 3.3: Establish a judgment matrix for the first-level index, calculate the weight vector and perform a consistency check. If the consistency check fails, perform parameter correction, and use the value that passes the consistency check as the first-level index weight.
步骤3.4,对二级指标建立判断矩阵,计算权重向量并进行一致性检验,若一致性检验不通过,进行参数修正,将通过一致性检验的值作为二级指标权重。Step 3.4, establish a judgment matrix for the secondary index, calculate the weight vector and perform a consistency check. If the consistency check fails, perform parameter correction, and use the value that passes the consistency check as the weight of the secondary index.
步骤3.5,给专家发放问卷调查表,得到评估指标的隶属度,构造隶属度模糊子集表,获得模糊综合评价矩阵。Step 3.5: Issue questionnaires to experts to obtain the membership degree of the evaluation index, construct the fuzzy subset table of the membership degree, and obtain the fuzzy comprehensive evaluation matrix.
步骤3.6,根据以下公式计算用户的信息安全能力指数,并进行MIN-MAX归一化处理。Step 3.6, calculate the user's information security capability index according to the following formula, and perform MIN-MAX normalization processing.
P=W1×W2×I (1)P=W 1 ×W 2 ×I (1)
其中,W1为一级指标权重矩阵,W2为二级指标权重矩阵,I为二级指标下中单个指标向量。Among them, W 1 is the weight matrix of the first-level indicators, W 2 is the weight matrix of the second-level indicators, and I is a single indicator vector under the second-level indicators.
二级指标中单个指标向量的计算公式如下:The calculation formula of a single indicator vector in the secondary indicator is as follows:
I=S×R×X (2)I=S×R×X (2)
其中,S为隶属度权重向量,R为模糊矩阵,X=(0 1 2 3)T为信息安全能力等级向量。Among them, S is the membership weight vector, R is the fuzzy matrix, X=(0 1 2 3) T is the information security capability level vector.
MIN-MAX归一化处理计算公式如下:The calculation formula of MIN-MAX normalization processing is as follows:
其中,P*为P归一化处理后的值,MAX为指数最大值,MIN为指数最小值。Among them, P * is the normalized value of P, MAX is the maximum value of the index, and MIN is the minimum value of the index.
步骤3.7,对信息安全能力指数进行等级划分,划分为信息安全能力强,信息安全能力较强,信息安全能力一般和信息安全能力弱四个等级。表2为信息安全能力指数等级表。In step 3.7, classify the information security capability index into four grades: strong information security capability, strong information security capability, general information security capability and weak information security capability. Table 2 is the information security capability index rating table.
表2.信息安全能力指数等级表Table 2. Information security capability index rating table
测试结果:实验基于移动终端行为对2017年8月至2017年12月期间某使用Android4.4.1系统的用户信息安全能力进行评测,得到该用户在此期间信息安全能力结果,基于该例数据,本发明提出方法可将测评效率提高10%-20%。Test results: The experiment evaluates the information security capability of a user who uses the Android 4.4.1 system from August 2017 to December 2017 based on the behavior of the mobile terminal, and obtains the results of the user's information security capability during this period. Based on the data of this example, this The method proposed by the invention can increase the evaluation efficiency by 10%-20%.
可以理解的是,本文描述的这些实施例可以用硬件、软件、固件、中间件、微码或其组合来实现。对于硬件实现,处理单元可以实现在一个或多个专用集成电路(ApplicationSpecificIntegratedCircuits,ASIC)、数字信号处理器(DigitalSignalProcessing,DSP)、数字信号处理设备(DSPDevice,DSPD)、可编程逻辑设备(ProgrammableLogicDevice,PLD)、现场可编程门阵列(Field-ProgrammableGateArray,FPGA)、通用处理器、控制器、微控制器、微处理器、用于执行本申请所述功能的其它电子单元或其组合中。It should be understood that the embodiments described herein may be implemented by hardware, software, firmware, middleware, microcode or a combination thereof. For hardware implementation, the processing unit can be implemented in one or more application-specific integrated circuits (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing device (DSPDevice, DSPD), programmable logic device (ProgrammableLogicDevice, PLD ), Field-Programmable Gate Array (Field-Programmable GateArray, FPGA), general-purpose processor, controller, microcontroller, microprocessor, other electronic units for performing the functions described in this application, or a combination thereof.
对于软件实现,可通过执行本文所述功能的单元来实现本文所述的技术。软件代码可存储在存储器中并通过处理器执行。存储器可以在处理器中或在处理器外部实现。For a software implementation, the techniques described herein are implemented by means of units that perform the functions described herein. Software codes can be stored in memory and executed by a processor. Memory can be implemented within the processor or external to the processor.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。Those skilled in the art can appreciate that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present invention.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the above-described system, device and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the embodiments provided in this application, it should be understood that the disclosed devices and methods may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。If the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the embodiment of the present invention is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present invention. The aforementioned storage medium includes: various media capable of storing program codes such as U disk, mobile hard disk, ROM, RAM, magnetic disk or optical disk.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It should be noted that, in this document, the term "comprising", "comprising" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or apparatus comprising a set of elements includes not only those elements, It also includes other elements not expressly listed, or elements inherent in the process, method, article, or device. Without further limitations, an element defined by the phrase "comprising a ..." does not preclude the presence of additional identical elements in the process, method, article, or apparatus comprising that element.
以上仅为本发明的优选实施例,并非因此限制本发明的范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的保护范围内。The above are only preferred embodiments of the present invention, and are not intended to limit the scope of the present invention. Any equivalent structure or equivalent process conversion made by using the description of the present invention and the contents of the accompanying drawings, or directly or indirectly used in other related technical fields, All are equally included in the scope of protection of the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810419424.XA CN108764481A (en) | 2018-05-04 | 2018-05-04 | A kind of information security ability evaluating method and system based on mobile terminal behavior |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810419424.XA CN108764481A (en) | 2018-05-04 | 2018-05-04 | A kind of information security ability evaluating method and system based on mobile terminal behavior |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108764481A true CN108764481A (en) | 2018-11-06 |
Family
ID=64010028
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810419424.XA Pending CN108764481A (en) | 2018-05-04 | 2018-05-04 | A kind of information security ability evaluating method and system based on mobile terminal behavior |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108764481A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112115479A (en) * | 2020-09-08 | 2020-12-22 | 恩善(厦门)信息科技有限公司 | Information security capability evaluation method and system based on mobile terminal behaviors |
CN113626982A (en) * | 2021-07-05 | 2021-11-09 | 郑州云智信安安全技术有限公司 | Information security capability evaluation method and system based on mobile terminal behaviors |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050114279A1 (en) * | 2000-08-03 | 2005-05-26 | Unicru, Inc. | Development of electronic employee selection systems and methods |
CN101470779A (en) * | 2007-12-24 | 2009-07-01 | 北京启明星辰信息技术股份有限公司 | Fuzzy risk evaluation system and method for computer information security |
CN101727627A (en) * | 2009-12-16 | 2010-06-09 | 工业和信息化部电子第五研究所 | Information system security risk assessment model based on combined evaluation method |
CN104063750A (en) * | 2014-06-27 | 2014-09-24 | 国家电网公司 | Method for predicting influence of disasters to power system based on improved AHP-anti-entropy weight |
CN104156662A (en) * | 2014-08-28 | 2014-11-19 | 北京奇虎科技有限公司 | Process monitoring method and device and intelligent terminal |
CN104156895A (en) * | 2014-08-20 | 2014-11-19 | 国网浙江余姚市供电公司 | Evaluation method and device |
CN104376266A (en) * | 2014-11-21 | 2015-02-25 | 工业和信息化部电信研究院 | Determination method and device for security level of application software |
CN105007170A (en) * | 2015-05-11 | 2015-10-28 | 大连理工大学 | A Comprehensive Evaluation Method of WLAN Network Load Based on FAHP-SVM Theory |
CN105279567A (en) * | 2014-06-30 | 2016-01-27 | 国网上海市电力公司 | Fuzzy comprehensive evaluation method for security risk of power supply enterprise electronic file |
CN106056308A (en) * | 2016-06-13 | 2016-10-26 | 宁波工程学院 | Highway tunnel operation environment safety risk automatic judgment method |
CN106096838A (en) * | 2016-06-14 | 2016-11-09 | 广州市恒迅技防系统有限公司 | Building fire safety evaluation method based on model of fuzzy synthetic evaluation and system |
CN106203831A (en) * | 2016-07-05 | 2016-12-07 | 杨林 | A kind of power supply enterprise Electronic Archival Security risk evaluating system |
CN107395430A (en) * | 2017-08-16 | 2017-11-24 | 中国民航大学 | A kind of cloud platform dynamic risk access control method |
-
2018
- 2018-05-04 CN CN201810419424.XA patent/CN108764481A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050114279A1 (en) * | 2000-08-03 | 2005-05-26 | Unicru, Inc. | Development of electronic employee selection systems and methods |
CN101470779A (en) * | 2007-12-24 | 2009-07-01 | 北京启明星辰信息技术股份有限公司 | Fuzzy risk evaluation system and method for computer information security |
CN101727627A (en) * | 2009-12-16 | 2010-06-09 | 工业和信息化部电子第五研究所 | Information system security risk assessment model based on combined evaluation method |
CN104063750A (en) * | 2014-06-27 | 2014-09-24 | 国家电网公司 | Method for predicting influence of disasters to power system based on improved AHP-anti-entropy weight |
CN105279567A (en) * | 2014-06-30 | 2016-01-27 | 国网上海市电力公司 | Fuzzy comprehensive evaluation method for security risk of power supply enterprise electronic file |
CN104156895A (en) * | 2014-08-20 | 2014-11-19 | 国网浙江余姚市供电公司 | Evaluation method and device |
CN104156662A (en) * | 2014-08-28 | 2014-11-19 | 北京奇虎科技有限公司 | Process monitoring method and device and intelligent terminal |
CN104376266A (en) * | 2014-11-21 | 2015-02-25 | 工业和信息化部电信研究院 | Determination method and device for security level of application software |
CN105007170A (en) * | 2015-05-11 | 2015-10-28 | 大连理工大学 | A Comprehensive Evaluation Method of WLAN Network Load Based on FAHP-SVM Theory |
CN106056308A (en) * | 2016-06-13 | 2016-10-26 | 宁波工程学院 | Highway tunnel operation environment safety risk automatic judgment method |
CN106096838A (en) * | 2016-06-14 | 2016-11-09 | 广州市恒迅技防系统有限公司 | Building fire safety evaluation method based on model of fuzzy synthetic evaluation and system |
CN106203831A (en) * | 2016-07-05 | 2016-12-07 | 杨林 | A kind of power supply enterprise Electronic Archival Security risk evaluating system |
CN107395430A (en) * | 2017-08-16 | 2017-11-24 | 中国民航大学 | A kind of cloud platform dynamic risk access control method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112115479A (en) * | 2020-09-08 | 2020-12-22 | 恩善(厦门)信息科技有限公司 | Information security capability evaluation method and system based on mobile terminal behaviors |
CN113626982A (en) * | 2021-07-05 | 2021-11-09 | 郑州云智信安安全技术有限公司 | Information security capability evaluation method and system based on mobile terminal behaviors |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wei et al. | Assessing the brittleness of safety alignment via pruning and low-rank modifications | |
Merigó et al. | Induced and linguistic generalized aggregation operators and their application in linguistic group decision making | |
CN111985751B (en) | Human-computer chat experience assessment system | |
CN106652620A (en) | Terminal evaluation method and device | |
CN108932646B (en) | Carrier-based user tag authentication method, device and electronic device | |
CN109242522A (en) | The foundation of target user's identification model, target user's recognition methods and device | |
Reddy | Fake profile identification using machine learning | |
CN110895568A (en) | Method and system for processing court trial records | |
CN108876076A (en) | The personal credit methods of marking and device of data based on instruction | |
CN108009911A (en) | A kind of method of identification P2P network loan borrower's default risks | |
CN105095411A (en) | Method and system for predicting APP ranking based on App quality | |
CN112104642A (en) | Abnormal account number determination method and related device | |
CN108320045A (en) | Student performance prediction technique and device | |
CN112861650A (en) | Behavior evaluation method, device and system | |
CN109977313A (en) | The recommended method and system of learner model construction method, education resource | |
WO2021135322A1 (en) | Automatic question setting method, apparatus and system | |
CN108764481A (en) | A kind of information security ability evaluating method and system based on mobile terminal behavior | |
CN108881157A (en) | A kind of individual information security capabilities evaluation method and system based on PC terminal behavior | |
Arai et al. | Predicting quality of answer in collaborative Q/A community | |
CN106709002A (en) | Intelligent exercise planning method and device based on natural language interaction | |
CN111026834B (en) | Question and answer corpus generation method and system | |
CN112131354A (en) | Answer screening method and device, terminal equipment and computer readable storage medium | |
CN114971658B (en) | An anti-fraud publicity method, system, electronic device and storage medium | |
CN114169524B (en) | A Media Relationship Management Expert System | |
CN110069711A (en) | User's Value Engineering Method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181106 |
|
RJ01 | Rejection of invention patent application after publication |