Fuzzy risk assessment of the network security

被引:0
|
作者
Zhao, Dong-Mei [1 ,2 ]
Wang, Jing-Hong [1 ]
Ma, Jian-Feng [2 ]
机构
[1] Hebei Normal Univ, Informat Technol, Shijiazhuang 050016, Peoples R China
[2] Xidian Univ, Comp Sci & Technol, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
risk assessment; AHP method; fuzzy logical method; entropy-weight coefficient;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A risk assessment method is introduced to the estimation of network security. The method, which combines AHP method and fuzzy logical method, is applied to the risk assessment. AHP method and Fuzzy logical method are improved according to the actual condition of the risk assessment of network security. Each risk factor is estimated in the aspect of the probability, the impact severity and uncontrollability. The important degree of each risk factor is obtained. By comparing the important degree of each factor, which risks will be controlled by some means are known. On the other hand, by applying entropy-weight coefficient, the risk degree of the whole network system is obtained, the method of entropy-weight coefficient is applied to objective computation, and subjective judgment is overcome. The study of the case shows that the method can be easily used to the risk assessment of the network security and its results conform to the actual situation.
引用
收藏
页码:4400 / +
页数:2
相关论文
共 50 条
  • [31] Apply Fuzzy Decision Tree to Information Security Risk Assessment
    Lee, Zne-Jung
    Chang, Li-Yun
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2014, 16 (02) : 265 - 269
  • [32] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
  • [33] Information systems security risk assessment on improved fuzzy AHP
    Wu, Xiaoping
    Fu, Yu
    Wang, Jiasheng
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 365 - 369
  • [34] A Fuzzy AHP Approach for Security Risk Assessment in SCADA Networks
    Markovic-Petrovic, Jasna D.
    Stojanovic, Mirjana D.
    Rakas, Slavica V. Bostjancic
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2019, 19 (03) : 69 - 74
  • [35] The Information Security Risk Assessment Based on Fuzzy Comprehensive Evaluation
    Li Guohong
    Cai Yongkai
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS A-C, 2008, : 2027 - 2031
  • [36] Risk Assessment for Information Security Based on Fuzzy Membership Matrix
    Bai, Yan
    Yao, Zhong
    Li, Hong
    Zhang, Yong-Qiang
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 547 - +
  • [37] The risk assessment and management of port security using fuzzy modeling
    Ung, S.T.
    Williams, V.
    Bonsall, S.
    Wang, J.
    Marine Technology and SNAME News, 2009, 46 (02): : 61 - 73
  • [38] An approach to wireless sensor network security assessment with fuzzy number intuitionistic fuzzy information
    Jiang Y.
    Jiang D.
    Advances in Information Sciences and Service Sciences, 2011, 3 (09): : 140 - 146
  • [39] Network Security Risk Assessment Using Intelligent Agents
    Mohammadian, Masoud
    2018 INTERNATIONAL SYMPOSIUM ON AGENTS, MULTI-AGENT SYSTEMS AND ROBOTICS (ISAMSR 2018), 2018,
  • [40] Network & Information System Security Risk Assessment Technology
    Yao Ye
    Cai Wandong
    Fang Nan
    2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 397 - 401