Research on training effectiveness assessment of network attack and defense

被引:0
|
作者
Zheng Yuanyuan [1 ]
Wang Tao [1 ]
Hou Zhiqi [1 ]
机构
[1] Mech Engn Coll, Shijiazhuang 050003, Peoples R China
关键词
individual training effectiveness assessment; coordinated training effectiveness assessment; integrated analysis and assessment; multiple attributes decision making (MADM); indexes parameter;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a research method in allusion to the training effectiveness assessment or network attack and defense skill. Individual training effectiveness assessment model, coordinated training effectiveness assessment model and integrated analysis and assessment model are founded using multiple attributes decision making (MADM). This method comprehensively considers diversified factors that affect on the effectiveness assessment, and advances corresponding resolvents.
引用
收藏
页码:165 / 168
页数:4
相关论文
共 50 条
  • [21] Research on the Construction of Network Security Attack and Defense Range System in Power Monitoring System
    Wei Mingxin
    INFORMATION TECHNOLOGY AND INTELLIGENT TRANSPORTATION SYSTEMS (ITITS 2017), 2017, 296 : 82 - 90
  • [22] Research on the Sample Training of BP Neural Network in Effectiveness Evaluation
    Shi, Yanbin
    Zhang, An
    Guo, Jian
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 6655 - +
  • [23] Adversarial organization modeling for network attack/defense
    Wu, Ji
    Ye, Chaoqun
    Jin, Shiyao
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 90 - 99
  • [24] Common Network Attack Types and Defense Mechanisms
    Das, Resul
    Karabade, Abubakar
    Tuna, Gurkan
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 2658 - 2661
  • [25] Practical attack graph generation for network defense
    Ingols, Kyle
    Lippmann, Richard
    Piwowarski, Keith
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
  • [26] CYBER ATTACK AND DEFENSE TRAINING: USING EMULAB AS A PLATFORM
    Kuo, Cheng-Chung
    Chain, Kai
    Yang, Chu-Sing
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2018, 14 (06): : 2245 - 2258
  • [27] Research on Basketball Confrontation Techniques in Attack and Defense
    Qiang, Wei
    Mei, Zhao Xiao
    Chao, Xie
    FUTURE INFORMATION TECHNOLOGY, 2011, 13 : 534 - 538
  • [28] Research of LAN Security Attack and Defense Technology
    Peng, Ying
    Wang, Rongfu
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 239 - 242
  • [29] Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model
    Liu, Jianyi
    Weng, Fangyu
    Zhang, Ru
    Guo, Yunbiao
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 161 - 173
  • [30] Research on Teaching Methods and Contents of Public Security Institutions "Network Attack and Defense Technology" Course
    Xu Guo-tian
    NATIONAL TEACHING SEMINAR ON CRYPTOGRAPHY AND INFORMATION SECURITY (2010NTS-CIS), PROCEEDINGS, 2010, : 216 - 219