Enterprise Network Business Process Incompatible Vulnerability Detection Method Based on Fpn Model

Enterprise Network Business Process Incompatible Vulnerability Detection Method Based on Fpn Model

Enterprise Network Business Process Incompatible Vulnerability Detection Method Based on FPN Model*
Yan Huaizhi
Beijing Key Laboratory of Software Security Engineering Technology School of Software Engineering, Beijing Institute of Technology Beijing, China yhzhi@bit.edu.cn

Ye Wenwen**
Beijing Key Laboratory of Software Security Engineering Technology School of Software Engineering, Beijing Institute of Technology Beijing, China two_ye@hotmail.com

Abstract—This paper proposes a kind of enterprise network business process characteristics, gives the definition of incompatible vulnerability, analyzes the formation mechanism of incompatible vulnerability. Then, we establish the FPN mapping model of incompatible vulnerability, propose an incompatible vulnerability detection method based on the FPN, and constructs the incompatible vulnerability detection system that can effectively detect the enterprise network business incompatible vulnerabilities. Keywords-FPN; business process; vulnerability; vulnerability detection incompatibility

the characteristics of collaborative combined with the general workflow technology. Using workflow primitives to describe collaborative processes and the incompatible vulnerabilities in collaborative processes are the conflicts and gaps between the business processes or inside the business process. Therefore, as for static workflow diagrams, using FPN net modeling techniques can describe static workflow diagrams as a Petri net system wherein for workflow concurrency characteristics can be a good simulation , then use the reachable marking graph theory of Petri nets and other methods to detect the incompatible vulnerabilities that may arise. II. MECHANISM OF THE ENTERPRISE BUSINESS PROCESS INCOMPATIBILITY VULNERABILITY

I.

INTRODUCTION

With the rapid development of the manufacturing industry of information technology, manufacturing enterprises, especially manufacturing enterprises with large complex equipment, their...

Similar Essays