Unlock instant, AI-driven research and patent intelligence for your innovation.

A Method for Analyzing the Impact of Increasing Information Security Mechanism on System Performance

A technology of information security and analysis methods, which is applied in the field of analysis of the impact of increasing information security mechanisms on system performance, and can solve problems such as increasing information security mechanisms, difficult modeling, and affecting system service quality

Active Publication Date: 2021-07-30
辽宁旺阳科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) The existing technology does not take into account the impact of information security mechanisms on system service quality, and only evaluates QoS by changing system performance parameters, which cannot be applied when adding information security mechanisms
[0008] (2) When adding an information security mechanism, an additional system is added to the original system to ensure system security. Although it has no effect on the performance parameters of the system, it will affect the service quality of the entire system. The original technology cannot be used evaluate this
[0012] Second: Since there are multiple factors in each scenario that play a role in QoS evaluation, the weight of each factor in different scenarios is different, and it is difficult to model from multiple dimensions
[0013] Third: It is very difficult to combine multiple scenarios as a whole to evaluate
[0014] Significance: In the existing technology, the impact on system performance is evaluated by changing system factors. However, with the development of modernization, the Internet of Things has spread to all aspects of people's lives, and information security issues cannot be avoided. Adding information security factors Different from changing system factors, it will affect the existing system QoS, so it is impossible to evaluate QoS with the original technology, and a new method must be used for evaluation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Analyzing the Impact of Increasing Information Security Mechanism on System Performance
  • A Method for Analyzing the Impact of Increasing Information Security Mechanism on System Performance
  • A Method for Analyzing the Impact of Increasing Information Security Mechanism on System Performance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0056] Based on the problems existing in the prior art, the present invention integrates a plurality of key factors affecting system performance, designs a QoS algorithm for scientifically and effectively evaluating system performance, and ensures that after adding an information security mechanism, the impact on the original system is minimized. performance.

[0057] Such as figure 1 The analysis system for increasing the impact of information security mechanisms on system performance provided by the embodiments of the present invention includes:

[0058] The criterion layer is the QoS evaluation index layer, which comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of computer and communication information security, and discloses an analysis method for increasing the influence of information security mechanisms on system performance. The analysis method for increasing the influence of information security mechanisms on system performance includes: data collection and processing: collection according to evaluation indicators Sources are classified and extracted; quantitative processing of qualitative evaluation, timeliness weighting of historical records, and normalization of original parameters; QoS comprehensive evaluation: standardization processing, determination of principal components, determination of weight values, and use of QoS comprehensive evaluation value calculation formulas judge. Based on the problems existing in the prior art, the present invention integrates multiple key factors that affect system performance, and designs a QoS algorithm that scientifically and effectively evaluates system performance, ensuring that after adding an information security mechanism, the impact on the original system is minimized. performance.

Description

technical field [0001] The invention belongs to the technical field of computer and communication information security, and in particular relates to an analysis method for increasing the influence of an information security mechanism on system performance. The invention is mainly used for evaluating the overall performance of the system after adding the information security mechanism, and judging whether the performance of the system meets the requirement after adding the security mechanism. Background technique [0002] With the rapid development of the Internet, the promotion of communication technology, and the popularization of the Internet of Things, information security has always been an unavoidable topic in the present invention. The Internet combines people and computers, and the Internet of Things combines people and objects, and objects and objects. Information security will also be extended from "people-network-equipment" to "people-network-equipment-items". The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/06G06F17/16
CPCG06F17/16G06Q10/0639
Inventor 李飞刘勇徐翔高路路
Owner 辽宁旺阳科技有限公司