Improved multilevel fuzzy comprehensive evaluation algorithm for security performance

被引:19
作者
College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China [1 ]
机构
[1] College of Computer, Nanjing University of Posts and Telecommunications
来源
J. China Univ. Post Telecom. | 2006年 / 4卷 / 48-53期
基金
中国国家自然科学基金;
关键词
Entropy weight; Multilevel fuzzy comprehensive evaluation; P2P network; Security;
D O I
10.1016/S1005-8885(07)60033-8
中图分类号
学科分类号
摘要
It is of great importance to take various factors into account when evaluating the network security performance. Multilevel fuzzy comprehensive evaluation is a relatively valid method. However, the traditional multilevel fuzzy comprehensive evaluation algorithm relies on the expert's knowledge and experiences excessively, and the result of the evaluation is usually less accurate. In this article, an improved multilevel fuzzy comprehensive evaluation algorithm, based on fuzzy sets core and entropy weight is presented. Furthermore, a multilevel fuzzy comprehensive evaluation model of P2P network security performance has also been designed, and the improved algorithm is used to make an instant computation based on the model. The advantages of the improved algorithm can be embodied in comparison with the traditional evaluation algorithm.
引用
收藏
页码:48 / 53
页数:5
相关论文
共 17 条
[1]  
Wang X.-Z., Shi W.-Z., Wang S.-L., Disposal of Fuzzy Space Information, pp. 1-153, (2003)
[2]  
Cao X.-D., Disposal and Application of Fuzzy Information, pp. 1-123, (2003)
[3]  
He X.-G., Theories and Techniques of Fuzzy Knowledge Disposal, pp. 1-56, (1998)
[4]  
Peng Z.-Z., Sun Y.-Y., Fuzzy and Its Application, pp. 1-101, (2002)
[5]  
Wu X.-F., Li C.-Q., The AHP study of general evaluation about the quality of managing personnel, Journal of Chongqing University of Posts and Telecommunications, 10, 1, pp. 53-57, (1998)
[6]  
Zhong S.-S., Fuzzy Theories and Techniques in Project Scheme, pp. 1-87, (2000)
[7]  
Qiu P.-L., Informatics and Its Application, pp. 1-235, (1999)
[8]  
Huang L.-M., Wang H., Multilevel fuzzy comprehensive evaluation method of network security, Journal of Liaoning Technical University, 23, 8, pp. 510-513, (2004)
[9]  
Shyi M.-C., Yih J.-H., Lee C.H., Document retrieval using fuzzy-valued concept networks, IEEE Trans on Systems, Man, and Cybernetics, 31, 1, pp. 111-118, (2001)
[10]  
Sumit G.-S., Razouqi Q., Schumacher H.J., A survey of recent advances in fuzzy logic in telecommunications networks and news challenges, IEEE Trans on Fuzzy Systems, 6, 3, pp. 443-447, (1998)