A Multi-Dimensional Network Security Metrics Model Based on TOPSIS

被引:0
|
作者
Zhao X. [1 ]
Zeng C. [1 ]
Xue J. [1 ]
Lin Q. [1 ]
Guo J. [1 ]
机构
[1] School of Computer Science and Technology, Beijing Institute of Technology, Beijing
关键词
Environmental security; Networks security metric; Reliability security; Technique for order preference by similarity to an ideal solution (TOPSIS); Vulnerability security;
D O I
10.15918/j.tbit1001-0645.2019.269
中图分类号
学科分类号
摘要
In order to measure network security comprehensively, technique for order preference by similarity to an ideal solution (TOPSIS) was chosen as a comprehensive evaluation method of network security metrics to quickly detect network attacks and measure their risks, and the network security was divided into three dimensions by analytic hierarchy process, namely, environmental safety, reliability security and vulnerability security. According to the three dimensions, the network security was divided, and the metrics of each dimension were extracted and quantified. In the dimension of environment security, the evaluation value of the network security was presented based on the measurement of the network infrastructure and basic data. In the dimension of reliability security, the network was abstracted as a graph, and the reliability safety index was calculated based on the complex network theory and graph theory. In the dimension of vulnerability security, the vulnerabilities in the network were scanned with tools, and the vulnerability security index was calculated. The experimental results show that the model can improve accuracy and real-time performance in network security metrics. It is important to locate the network security risks and enhance the safety of network in time and accurately. © 2021, Editorial Department of Transaction of Beijing Institute of Technology. All right reserved.
引用
收藏
页码:311 / 321
页数:10
相关论文
共 19 条
  • [1] OLASUPO T O, OTERO C E., Framework for optimizing deployment of wireless sensor networks, IEEE Transactions on Network and Service Management, 15, 3, pp. 1105-1118, (2018)
  • [2] Mojahedian Mohammad Mahdi, GOHARI A, Et al., On the equivalency of reliability and security metrics for wireline networks, IEEE International Symposium on Information Theory, 26, pp. 2713-2717, (2016)
  • [3] TIAN Jianwei, TIAN Zheng, QI Wenhui, Et al., Threat propagation based security situation quantitative assessment in multi-node network, Journal of Computer Research and Development, 54, 4, pp. 731-741, (2017)
  • [4] QU Longyu, JIA Yizhen, HAO Yongle, Automatic classification of vulnerabilities based on CNN and text semantics, Transactions of Beijing Institute of Technology, 39, 7, pp. 738-742, (2019)
  • [5] LI Juan, CUI Jia, SHI Lei, Based on memory of key information infrastructure security detection technology, Transactions of Beijing Institute of Technology, 39, 9, pp. 987-990, (2019)
  • [6] LIU Xuejiao, YE Wei, JIANG Jingwei, Et al., Secure data storage scheme in hybrid cloud, Transactions of Beijing Institute of Technology, 3, pp. 295-303, (2019)
  • [7] ZHANG Guanghua, PANG Shaobo, ZHANG Yuqing, Et al., Research on trust level model based on static game in the cloud environment, Transactions of Beijing Institute of Technology, 38, 1, pp. 96-101, (2018)
  • [8] ZHANG Mengyuan, Et al., Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks, IEEE Transactions on Information Forensics & Security, 5, pp. 1071-1086, (2016)
  • [9] JIANG Xuwei, WEN Zhicheng, DENG Yongjie, Hierarchical network security situation assessment method based on synthetic weighting, Microcomputer and Application, 21, pp. 3-6, (2015)
  • [10] WANG Huan, CHEN Zhanfang, FENG Xin, Et al., Research on network security situation assessment and quantification method based on analytic hierarchy process, Wireless Personal Communications, 102, pp. 1401-1420, (2018)