期刊文献+

计算机网络攻击效果灰色评估模型和算法 被引量:14

Grey evaluation model and algorithm of network attack effectiveness
下载PDF
导出
摘要 计算机网络攻击效果评估是一个非常复杂的问题,在网络攻防实战环境下存在信息不完全和不确定的问题,而研究"少数据不确定"问题的灰色理论是处理此类问题的有力工具。提出将灰色理论应用于网络攻击效果评估,建立了计算机网络攻击效果评估指标体系,提出了基于粗糙集属性重要性的评估指标权重确定方法,研究了网络攻击效果灰色评估模型和评估算法。最后进行了实例验证,结果表明,该方法不仅能评估单个攻击方法的攻击效果,还能对不同攻击方法进行效果排序。 Network attack effect evaluation is a complex problem especially in the operation of network attack and de-fence, in which the information is incomplete and vague.The grey system theory is a powerful tool to solve the problem which has a little and uncertain information.A grey evaluation system and model, based on the evaluation index system, was proposed and grey evaluation algorithm was introduced.Using rough set theory, the nonlinear combination weight of evaluation indices was established.A simulation example was also given, which showed that the approach was brief and effective.This approach can be used to evaluate the effectiveness of single attack, as well as to compare like kind attack, so that the attack can be sorted based on the effect evaluation.
出处 《通信学报》 EI CSCD 北大核心 2009年第S2期17-22,共6页 Journal on Communications
关键词 攻击效果 灰色理论 评估模型 评估算法 attack effectiveness grey theory evaluation method evaluation algorithm
  • 相关文献

参考文献7

二级参考文献31

  • 1刘欣然.网络攻击分类技术综述[J].通信学报,2004,25(7):30-36. 被引量:36
  • 2姚富强,都基焱.通信系统的灰关联分析[J].电子学报,1994,22(7):61-67. 被引量:10
  • 3ICOVE D,SEGER K,VONSTORC W.Computer Crime:a Crimefighter's Handbook[M].O'Reilly & Associates,Inc,1995.
  • 4COHEN F.nformation system attacks:a preliminary classification scheme[J].Computers and Security,1997,16(1):29-46.
  • 5TEKL P,PAUL W.Can computer crime be stopped?[J].IEEE Spectrum,1984,21(5):34-45.
  • 6RUSSELL D,GANGEMI G.Computer Security Basics[M].O'Reilly & Associates,Inc,1991.
  • 7NEUMANN P,PARKER D.A summary of computer misuse techniques[A].The 12th National Computer Security Conference[C].USA,1989.396-407.
  • 8NEUMANN P.Computer Related Risks[M].The ACM Press,1995.
  • 9Vulnerabilities:taxonomy and classification[EB/OL].http://tennis.ecs.umass.edu/~czou/link/security_course/lecture5b,2002.
  • 10HOWARD J.An Analysis of Security Incidents on the Internet[D].USA.Carnegie Mellon University,1997.

共引文献77

同被引文献98

引证文献14

二级引证文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部