Enterprise Network Business Process Incompatible Vulnerability Detection Method Based on FPN Model*
Beijing Key Laboratory of Software Security Engineering Technology School of Software Engineering, Beijing Institute of Technology Beijing, China email@example.com
Beijing Key Laboratory of Software Security Engineering Technology School of Software Engineering, Beijing Institute of Technology Beijing, China firstname.lastname@example.org
Abstract—This paper proposes a kind of enterprise network business process characteristics, gives the definition of incompatible vulnerability, analyzes the formation mechanism of incompatible vulnerability. Then, we establish the FPN mapping model of incompatible vulnerability, propose an incompatible vulnerability detection method based on the FPN, and constructs the incompatible vulnerability detection system that can effectively detect the enterprise network business incompatible vulnerabilities. Keywords-FPN; business process; vulnerability; vulnerability detection incompatibility
the characteristics of collaborative combined with the general workflow technology. Using workflow primitives to describe collaborative processes and the incompatible vulnerabilities in collaborative processes are the conflicts and gaps between the business processes or inside the business process. Therefore, as for static workflow diagrams, using FPN net modeling techniques can describe static workflow diagrams as a Petri net system wherein for workflow concurrency characteristics can be a good simulation , then use the reachable marking graph theory of Petri nets and other methods to detect the incompatible vulnerabilities that may arise. II. MECHANISM OF THE ENTERPRISE BUSINESS PROCESS INCOMPATIBILITY VULNERABILITY
With the rapid development of the manufacturing industry of information technology, manufacturing enterprises, especially manufacturing enterprises with large complex equipment, their...