Fuzzy risk assessment of the network security

被引:0
|
作者
Zhao, Dong-Mei [1 ,2 ]
Wang, Jing-Hong [1 ]
Ma, Jian-Feng [2 ]
机构
[1] Hebei Normal Univ, Informat Technol, Shijiazhuang 050016, Peoples R China
[2] Xidian Univ, Comp Sci & Technol, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
risk assessment; AHP method; fuzzy logical method; entropy-weight coefficient;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A risk assessment method is introduced to the estimation of network security. The method, which combines AHP method and fuzzy logical method, is applied to the risk assessment. AHP method and Fuzzy logical method are improved according to the actual condition of the risk assessment of network security. Each risk factor is estimated in the aspect of the probability, the impact severity and uncontrollability. The important degree of each risk factor is obtained. By comparing the important degree of each factor, which risks will be controlled by some means are known. On the other hand, by applying entropy-weight coefficient, the risk degree of the whole network system is obtained, the method of entropy-weight coefficient is applied to objective computation, and subjective judgment is overcome. The study of the case shows that the method can be easily used to the risk assessment of the network security and its results conform to the actual situation.
引用
收藏
页码:4400 / +
页数:2
相关论文
共 50 条
  • [21] Risk Assessment of Computer Network Security in Banks
    Juan, Tan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 1 - 10
  • [22] Application of RBF Neural Network in Network Security Risk Assessment
    Zheng, Zhao-na
    Sun, Peng
    2011 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND APPLICATIONS, 2011, : 43 - 46
  • [23] Network Security Assessment based on Fuzzy Sets and Rough Sets
    Li, Rui
    Yang, Yi
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4674 - +
  • [24] Network security situation assessment based on intuitionistic fuzzy sets
    Han X.-L.
    Liu Y.
    Zhang Z.-J.
    Lyu X.
    Li Y.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2019, 49 (01): : 261 - 267
  • [25] Security risk assessment of submerged floating tunnel based on fault tree and multistate fuzzy Bayesian network
    Qiao, Dongsheng
    Zhou, Xiangbo
    Ye, Xiangji
    Tang, Guoqiang
    Lu, Lin
    Oua, Jinping
    OCEAN & COASTAL MANAGEMENT, 2024, 258
  • [26] Assessment of risk of information security by means of the theory of fuzzy sets
    Murathin, R.
    Satybaldina, D. Z.
    BULLETIN OF THE KARAGANDA UNIVERSITY-MATHEMATICS, 2015, 79 (03): : 66 - 74
  • [27] Fuzzy multi-attribute security risk assessment model
    Gu Yonghao
    Yong, Liu
    PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON RISK ANALYSIS AND CRISIS RESPONSE, 2007, 2 : 369 - 374
  • [28] The Risk Assessment and Management of Port Security Using Fuzzy Modeling
    Ung, S. T.
    Williams, V.
    Bonsall, S.
    Wang, J.
    MARINE TECHNOLOGY AND SNAME NEWS, 2009, 46 (02): : 61 - 73
  • [29] Application of Fuzzy Logic in the Process of Information Security Risk Assessment
    Kokles, Mojmir
    Filanova, Jana
    Korcek, Frantisek
    INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 1078 - 1088
  • [30] Research on fuzzy group decision making in security risk assessment
    Liu, F
    Dai, K
    Wang, ZY
    Ma, J
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 1114 - 1121