Fuzzy risk assessment of the network security

被引:0
|
作者
Zhao, Dong-Mei [1 ,2 ]
Wang, Jing-Hong [1 ]
Ma, Jian-Feng [2 ]
机构
[1] Hebei Normal Univ, Informat Technol, Shijiazhuang 050016, Peoples R China
[2] Xidian Univ, Comp Sci & Technol, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
risk assessment; AHP method; fuzzy logical method; entropy-weight coefficient;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A risk assessment method is introduced to the estimation of network security. The method, which combines AHP method and fuzzy logical method, is applied to the risk assessment. AHP method and Fuzzy logical method are improved according to the actual condition of the risk assessment of network security. Each risk factor is estimated in the aspect of the probability, the impact severity and uncontrollability. The important degree of each risk factor is obtained. By comparing the important degree of each factor, which risks will be controlled by some means are known. On the other hand, by applying entropy-weight coefficient, the risk degree of the whole network system is obtained, the method of entropy-weight coefficient is applied to objective computation, and subjective judgment is overcome. The study of the case shows that the method can be easily used to the risk assessment of the network security and its results conform to the actual situation.
引用
收藏
页码:4400 / +
页数:2
相关论文
共 50 条
  • [41] Network Security Risk Assessment Based on Node Correlation
    Wang, Zengguang
    Lu, Yu
    Li, Jindong
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [42] Network Security Risk Assessment Based on Association Rules
    Cheng, Xiaorong
    Wei, Yan
    Geng, Xin
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1142 - 1145
  • [43] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [44] Network security risk assessment of UPIDs in the distribution system
    Yan K.
    Lu Y.
    Qin F.
    Liu X.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2023, 51 (11): : 64 - 76
  • [45] Pipeline Risk Assessment Using a Fuzzy Systems Network
    Perez Hoyos, Gustavo
    PROCEEDINGS OF THE 2013 JOINT IFSA WORLD CONGRESS AND NAFIPS ANNUAL MEETING (IFSA/NAFIPS), 2013, : 1495 - 1498
  • [46] Using fuzzy logic and entropy theory to risk assessment of the information security
    Zhao, DM
    Wang, JH
    Wu, J
    Ma, JF
    Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2448 - 2453
  • [47] A Method of Information Security Risk Assessment Using Fuzzy Number Operations
    Fu, Yu
    Qin, Yanlin
    Wu, Xiaoping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12564 - 12567
  • [48] Risk assessment of power system network security based on RBF neural network
    Yu Y.
    Di C.
    Guo X.
    International Journal of Power and Energy Conversion, 2023, 14 (2-3) : 148 - 158
  • [49] Security Risk Assessment Based on CRITIC and Improved Neural Network
    Cai, Lijuan
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 142 - 147
  • [50] Risk Assessment Approach of In-Vehicle Network Information Security
    Wanh, Jian
    Zhang, Shaowei
    Chen, Hengwei
    Wang, Pengcheng
    CICTP 2022: INTELLIGENT, GREEN, AND CONNECTED TRANSPORTATION, 2022, : 1957 - 1968