期刊文献+

基于区间判断矩阵的层次化风险评估方法 被引量:4

Hierarchy risk evaluation method based on interval judgment matrix
下载PDF
导出
摘要 传统的AHP方法由于判断值受人为影响因素太大,导致在衡量多因素权重时常常出现结果不一致,影响了结论的准确性和评估结果的可信任性。建立了基于"网络-主机-服务-评估因子"的层次风险评估模型,利用层次化的计算模型评估网络的风险等级。从给出的区间判断矩阵入手,将区间判断矩阵一致逼近到一般的数字判断矩阵,提出一种自动修正判断矩阵的层次分析法,得到各层元素的近似权重。通过实例验证,表明该方法能精确地、自动化量化实时风险势态状况。 Because the judgment of traditional AHP is deeply subjected to the artificial factor,results don't consist with each other while scaling multifactor weight,influencing the accuracy of the conclusion and the dependability of the analyzing results. This paper builds up a hierarchy risk evaluation model based on 'network-host-service-evaluation factor' ,using the hierarchized calculation model to evaluate the risk grade of the network.Considering the given interval judgment matrix,firstly,make it consistently approximate a digital judgment matrix,then bring an analytic hierarchy process of adjusting judgment matrix forward, finally,gain approximate weight of every layer's elements.Experiments and examples validate that this method can quantize the real-time risk condition accurately and automatically.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第10期127-130,共4页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60673156)
关键词 风险评估 层次分析法 区间判断矩阵 自动修正判断矩阵 risk evaluation analytic hierarchy process interval judgment matrix adjusting judgment matrix
  • 相关文献

参考文献15

  • 1Saaty T L.The analytic hierarchy process[M].New York:McGraw Hill, 1980.
  • 2Mustafa M A,FAI-Bahar J.Project risk assessment using the analytic hierarchy process[J].IEEE Trans on Engineering Management, 1991,1(38) :46-52.
  • 3Bao Yi-dan,Wu Yan -ping, He Yong,et al.An improved AHP method in performance assessment[C]//Proceedings of the 5th World Congress on Intelligent Control and Automation,Hangzhou,P.R. China,June 15-19,2004: 177-180.
  • 4Bodin L D,Gordon L A,Loeb M P.Evaluating information security investments using the analytic hierarchy process[J].Communications of the ACM,2005,48(2):79-83.
  • 5Zhao Dongmei Wang Changguang Ma Jianfeng.A RISK ASSESSMENT METHOD OF THE WIRELESS NETWORK SECURITY[J].Journal of Electronics(China),2007,24(3):428-432. 被引量:13
  • 6罗捷,刘颖,文华英.计算机网络风险评价方法——层次分析法[J].信息安全与通信保密,2002(3):35-37. 被引量:3
  • 7朱岩,杨永田,张玉清,冯登国.基于层次结构的信息安全评估模型研究[J].计算机工程与应用,2004,40(6):40-43. 被引量:30
  • 8李放歌,柏继云,赵红杰.层次分析积因子位次赋值数据求权重研究[J].运筹与管理,2005,14(6):60-63. 被引量:17
  • 9Fatih Tuysuz,PCengiz Kahraman.Project risk evaluation using a fuzzy analytic hierarchy process: an application to information technology projects:research articles[J].International Journal of Intelligent Systems,2006,6(21 ) :559-584.
  • 10闵京华,王晓东.国家信息安全测评认证[M].北京:国家信息安全测评认证中心,2005.

二级参考文献39

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2田野,谢永忠.公安信息网络系统安全分析与管理策略[J].网络安全技术与应用,2004(9):55-57. 被引量:8
  • 3赵冬梅,张玉清,马建峰.网络安全的综合风险评估[J].计算机科学,2004,31(7):66-69. 被引量:23
  • 4刘枫,沈军,秦仁喜,吴广明,周斌,肖轶群,吴兆丰.聚对二甲苯/SiO_2复合薄膜的制备及光学性能研究[J].功能材料与器件学报,2005,11(1):38-42. 被引量:3
  • 5[1]Rommelfanger HJ.Multicriteria Decision Making Using Fuzzy Logic [C].In:Proceedings of the Conference on the North American Fuzzy Information Processing Society, 1998: 360~364
  • 6[2]Hanseong S,Poonghyun S.A Software Safety Evaluation Method Based on Fuzzy Colored Petri Nets[C].In:Proceedings of International Conference on Fuzzy Systems, 1999; (2): 830~834
  • 7[3]Antonakopoulos T, Agavanakis K.CASE Tools Evaluation: An Automatic Process Based on Fuzzy Sets Theory[C].In:Proceedings of Sixth IEEE International Workshop on Rapid System Prototyping, 1995:140~146
  • 8[4]Cannavacciuolo A,Capaldo G.A Fuzzy Model of the Evaluation Process[C].In:Proceedings of the Fifth IEEE International Conference on Fuzzy Systems, 1996; (2) :828~834
  • 9[5]Copigneaux F,Martin S.Software Security Evaluation Based on a Topdown McCall-like Approach[C].In:Proceedings of the Fourth Conference on Aerospace Computer Security Applications, 1988:414~418
  • 10[6]Garrabrants WM,Ellis AW.CERTS :A Comparative Evaluation Methodfor Risk Management Methodologies and Tools[C].In:Proceedings of the Sixth Annual Computer Security Applications Conference,1990:251~257

共引文献460

同被引文献45

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部