Network Security Risk Assessment Based on Fuzzy Analytical Hierarchy Process

Article Preview

Abstract:

This paper proposes an evaluation method based on fuzzy analytic hierarchy process (FAHP) for network security risk assessment. The paper analyzes the network security risk factors. By paired comparison of the importance of factors, the interval number fuzzy complementary judgment matrix is established to get the weight vectors of interval numbers of the factors. Then, by comparing the weight vectors of interval numbers, a possibility degree matrix is established, and then the weight coefficient of each factor are obtained. Finally the sorting result of the network security risk factors is presented. Instances show that the method is feasible and effective and it provides a reliable basis for security risk control strategy of network security staff.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

971-975

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Dengguo Feng, Yang Zhang, Yuqing Zhang. Journal of China Institute of Communications (In Chinese), Vol. 25 (2004), No. 7, p.10.

Google Scholar

[2] Jianxin Fu, Lianfen Huang, Yan Yao. Journal of Xiamen University (Natural Science) (In Chinese), Vol. 49 (2010), No. 5, p.622.

Google Scholar

[3] Wei Jia, Yifeng Lian, Dengguo Feng, Sisi Chen. Journal on Communications (In Chinese), Vol. 29 (2008), No. 10, p.191.

Google Scholar

[4] Tianping Chen, Shijun Xu, Chuanrong Zhang, Lianqing Zheng. Computer Science, Vol. 37 (2010), No. 9, p.94.

Google Scholar

[5] Hongyu Yang, Hua Jiang. Computer Science (In Chinese), Vol. 40 (2013), No. 2, p.148.

Google Scholar

[6] Ming Fang, Kaiyong Xu, Tianchi Yang, Fanwei Meng, Cong Yu. Computer Science (In Chinese), Vol. 40 (2013), No. 2, p.139.

Google Scholar

[7] Jing Zhu. Network Security Risk Assessment Model Based on Dempster-Shafer Theory[D]" (In Chinese). Thesis Submitted to North China Electric Power University for Master, s Degree, (2008).

Google Scholar

[8] Ying Zhuo, Qiang Zhang and Zhenghu Gong. Network Situation Assessment Based on RST,. Proceedings of 2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008, p.502.

DOI: 10.1109/paciia.2008.133

Google Scholar

[9] Yu Fu, Xiaoping Wu, Qing Ye, Xi Peng. Acta Electronica Sinica (In Chinese), Vol. 38 (2010), No. 7, p.1489.

Google Scholar

[10] Jiasheng Wang,  Yu Fu,  Xiaoping Wu. Journal of Wuhan University of Technology (Transportation Science & Engineering) (In Chinese), Vol. 35 (2011), No. 1, p.51.

Google Scholar

[11] Jiasheng Wang,  Yu Fu,  Xiaoping Wu. Fire Control & Command Control (In Chinese), Vol. 36 (2011), No. 4, p.33.

Google Scholar

[12] Xia Chen, Zhiping Fan. Journal of Northeastern University(Natural Science) (In Chinese), Vol. 26 (2005), No. 6, p.595.

Google Scholar