Fuzzy Comprehensive Evaluation Model of Computer Network Security and its Application

Article Preview

Abstract:

Network security assessment is a complex multi-criteria problem including both quantitative and qualitative factors. In this paper, taken the computer network security evaluation index for a research object, the judgment matrix of index weight was improved based on the fuzzy theory, and a new weight determination approach was proposed to make up the shortcomings of traditional weight determination method and highlight the fuzziness of expert judgment. Meanwhile using fuzzy theory to establish fuzzy evaluation matrix, then combine analytic hierarchy process to set up a fuzzy AHP evaluation model of the computer network security. At the final stage, a security assessment of the system of an institution’s network was to implement to demonstrate the feasibility of the evaluation model.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

286-292

Citation:

Online since:

December 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Jungang Yang, Li Liang, Guangliang Zhu, et al. A Network Security Risk Assessment Method Based on Real-time Security Warning[J]. Journal of Convergence Information Technology, 2013, 8(2): 56-61.

Google Scholar

[2] Jianying Li. Research of comprehensive evaluation of computer network security evaluation and precautions based on artificial neural networks and fuzzy[D]. Lanzhou University, (2003).

Google Scholar

[3] Jian Shen. Application Study on Evaluation Method of Network Security[D]. Lanzhou University, (2005).

Google Scholar

[4] Jianhong Li, Guangzhen Li. Application Study on Evaluation Method of Network Security[J]. Computer Simulation, 2011, (7): 165-168.

Google Scholar

[5] Fuyong Xu, Jian Shen, Jianying Li. Study and application of comprehensive assessment method for network security[J]. Computer Engineering and Design, 2006, 27(8): 1398-1400.

Google Scholar

[6] Li Tao, Xu Jiang. The Building of Network Information Security Comprehensive Evaluation index System based on Analytical Hierarchy Process[J]. International Journal of Advancements in Computing Technology, 2013, 5(3): 850-856.

DOI: 10.4156/ijact.vol5.issue3.98

Google Scholar

[7] Liou Tianshy, Wang maojiun. Ranking fuzzy numbers with integral value[J]. Fuzzy Sets and Systems, 1992, 50(3): 247-255.

DOI: 10.1016/0165-0114(92)90223-q

Google Scholar