Study on the Evaluation Model for Network Security

Article Preview

Abstract:

This paper investigates the network security problem which is complex to evaluate. The key of this evaluation is to establish the factors and weights. Traditional methodologies cannot get rid of the key issues, resulting incorrect evaluation. In order to improve the accuracy, this paper proposes an evaluation model which is based on analytical hierarchy process (AHP) to evaluate the network security in the real-life background. There are several steps. First, evaluation factors are set up through Delphi method. Second, the weights are determined by AHP. Third, the evaluation is executed. Finally, the real-life cases are used to verify the model. The verification indicates that AHP enables to evaluate the network security efficiently in terms of objectiveness, high accuracy and comprehensiveness.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 317-319)

Pages:

1745-1748

Citation:

Online since:

August 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Stallings, W., Network security essentials: applications and standards. 2007: Prentice Hall.

Google Scholar

[2] Feixian, S., W. Jianhong, and D. Zhiyong, Network Security Evaluation Model Based on FCM [J]. Journal of Henan Institute of Engineering (Natural Science Edition), 2009. 2.

Google Scholar

[3] Zhi-qin, S., et al., Study of campus network security evaluation index system based on extension analytic hierarchy process. Journal of Hefei University of Technology (Natural Science), 2010.

Google Scholar

[4] Gong, Q. and H. Ding, Threat Evaluation Model for Hierarchical Network Security Based on DS Evidence Theory. Computer Applications and Software, 2008. 11: pp.121-124.

Google Scholar

[5] Kotenko, I. and M. Stepashkin. Attack graph based evaluation of network security. 2006: Springer.

Google Scholar

[6] Laborde, R., et al., A formal approach for the evaluation of network security mechanisms based on RBAC policies. Electronic Notes in Theoretical Computer Science (ENTCS), 2005. 121: pp.117-142.

DOI: 10.1016/j.entcs.2004.10.011

Google Scholar

[7] Wong, J.K.W. and H. Li, Application of the analytic hierarchy process (AHP) in multi-criteria analysis of the selection of intelligent building systems. Building and Environment, 2008. 43(1): pp.108-125.

DOI: 10.1016/j.buildenv.2006.11.019

Google Scholar

[8] Saaty, T.L., Analytic hierarchy process. 1980.

Google Scholar

[9] Saaty, T.L., Decision making with the analytic hierarchy process. International Journal of Services Sciences, 2008. 1(1): pp.83-98.

Google Scholar

[10] Kaufman, C., R. Perlman, and M. Speciner, Network security: private communication in a public world. 2002.

Google Scholar

[11] Walker, S.T., Network security overview. 1985.

Google Scholar

[12] Manizade, A.G. and M. Mason, Delphi Method: A Different Approach Of Creating Measures Of Professionsl Knowledge For Teaching. 2009.

Google Scholar

[13] Lye, K. and J.M. Wing, Game strategies in network security. International Journal of Information Security, 2005. 4(1): pp.71-86.

Google Scholar