Distributed storage security analysis method
A technology of distributed storage and analysis method, applied in the field of computer network information security, can solve problems such as failure to take into account changes in the state of associated software systems, inability to complete distributed storage system security analysis, and inability to provide security status descriptions, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach
[0043] Specific implementation method: combined Figure 1-Figure 3 Description of this embodiment
[0044] Safe Fault Tree Method
[0045] The fault tree provides a mathematical and graphical representation of the basic event combinations that lead to system failure. It illustrates which combination of events will lead to the observed failure symptoms. It can abstractly and accurately describe the safety requirements of the system without involving its implementation details. , so that security managers can fully and accurately understand the definition of security requirements of the system, and can find loopholes in system security through formal analysis methods;
[0046]The distributed storage system actually disperses data to different servers through the network, and the security attributes of the network and the server are finally described as a security state space SSP, that is, SSP=(SS,AR).
[0047] SS—the set of all reachable security states during the attack on th...
specific Embodiment approach 2
[0110] A complete fault tree consists of top events, bottom events, intermediate events and logic gates.
[0111] 1) Top event: In the fault tree analysis, the least expected fault state of the system is taken as the target of logical analysis, that is, the top event. The top event is located at the top of the fault tree, also known as the result event, which is the final state that the system can achieve due to various possible faults. There can only be one top event in a fault tree.
[0112] 2) Bottom event: also called the cause event, it is the input event of the logic gate and is located at the bottom of the fault tree. The bottom event is the cause of the top event.
[0113] 3) Intermediate event: The resulting event located between the top event and the bottom event is an intermediate event.
[0114] 4) Logic gate: used to connect components between events.
[0115] A simple fault tree and its symbolic representation as Figure 3-1 .
[0116] T represents the top ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


