Application of Fuzzy Logic in the Network Security Risk Evaluation

Article Preview

Abstract:

This paper introduces the development history of fuzzy logic and its application in network security evaluation. The main content includes fuzzy comprehensive method of evaluating network security risk, and entropy weight coefficient method in network security risk evaluation. At last, it points that the application of fuzzy logic in network security evaluation is a new research field and many problems remain to be solved.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 282-283)

Pages:

359-362

Citation:

Online since:

July 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] XU Yan, ZHONG De-ming. Research on Network Security evaluation Based on Fuzzy Method. Measurement and Control Technology. Vol. 28 NO. 2, 2009, 79-82.

Google Scholar

[2] ZHAO Dongmei, ZHANG Yuqing, MA Jianfeng. Fuzzy Risk Assessment of Entropy Weight Coefficient Method Applied in Network Security. Computer engineering. Vol. 30 NO. 18 Sep 2004, 21-23.

Google Scholar

[3] ZHAO Dongmei, SU Hongshun, WU Jing, MA Jianfeng. Fuzzy Risk Assessment of the Wireless Network Security Based on Entropy Theory. Computer applications and software. Vol. 23 NO. 8 Aug 2004, 24-26.

Google Scholar

[4] SUN Zhi-xin, XU Hong-xia. Survey of the Application Research of Fuzzy Technology to Intrusion Detection Systems, Journal of Nanjing University of Posts and Telecommunications (Natural science) Vol. 26 No. 4 Aug. 2006, 73-78.

Google Scholar

[5] DICKERSON J E, TUSLIN J, KOUKOUSOULA O, et al. Fuzzy intrusion detection, Proceedings of IFSA World Congress and 20th NAFIPS international Conference. Vancouver, British Columbia, 2001: 1506-1510.

DOI: 10.1109/nafips.2001.943772

Google Scholar

[6] WU Hui, XIE Yan-feng, ZHANG Zhong-lin. Intrusion Detection System Based on Fuzzy Choose-closed Principle. Journal of Lanzhou Jiaotong University, 2008, 27(6), 100-102.

Google Scholar