A Design of the Network Security Evaluation System

Article Preview

Abstract:

The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security measure, improve the security performance and design the appropriate security risk evaluation and management tools.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

458-462

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chert Yan, Li Zengzhi, Liao Zhigang, Study on Network Security Architecture for Power Systems, Electricity. 2005 No. 3 pp.47-49.

Google Scholar

[2] Zhang Lijuan, Wang Qingxian, A Network Security Evaluation Method based on FUZZY and RST, 2nd international Conference on Education Technology and Computer (ICETC) 2010, Vol2. pp.40-45.

DOI: 10.1109/icetc.2010.5529440

Google Scholar

[3] Kai Li, Naijie Gu, Kun Bi, Hongzhu Ji, Network Security Evaluation Algorithm Based on Access Level Vectors, The 9th International Conference for Young Computer Scientists, pp.1540-1544.

DOI: 10.1109/icycs.2008.333

Google Scholar

[4] I. Kotenko, M. Stepashkin, Attack Graph Based Evaluation of Network Security, IFIP International Federation for Information Processing 2006, LNCS 4237, pp.216-227.

DOI: 10.1007/11909033_20

Google Scholar

[5] I. Kotenko, M. Stepashkin, Analyzing Vulner- abilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle, Springer-Verlag Berlin Heidelberg 2005, LNCS 3685, pp.311-324. 1544.

DOI: 10.1007/11560326_24

Google Scholar