期刊文献+

基于层次分析法-灰色聚类的无线网络安全风险评估方法 被引量:24

Risk Evaluation of Wireless Network Security Based on AHP-grey Clustering Method
下载PDF
导出
摘要 无线网络安全风险评估由于各类评价指标的子因素较多,且存在模糊性和相对性,采用传统的风险评价方法难以达到直观量化的要求.采用基于层次分析法(AHP)和灰色聚类相结合的风险评估方法,首先对无线网络中的各种安全聚类指标进行层次化分析,量化出各层指标的权重,再采用灰色聚类的方法进行聚类分析,得出无线网络的风险值,从而确定网络的安全情况.结果表明,该方法是一种有效的无线网络安全风险评估方法. For the purpose to evaluate the security of wireless networks,we have to consider many evaluation indexes,many factors are ambiguous and relative.Therefore it is difficult to achieve quantitative assessment requirements intuitively by using traditional methods of risk evaluation.This paper proposes a model based on analytic hierarchy process(AHP) and gray clustering.Firstly by analyzing various security indexes hierarchically,we can quantify the weight of indicators of every layers,and then using the gray clustering to get clustering analysis,finally,we can determine the network security situation through obtaining risk clustering indexes.This method is proved to be efficient in wireless network security risk assessment.
出处 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2010年第5期622-626,共5页 Journal of Xiamen University:Natural Science
基金 高通无线通信研究计划
关键词 灰色聚类 层次分析法 风险评估 聚类指标 gray clustering analytic hierarchy process risk evaluation clustering index
  • 相关文献

参考文献5

二级参考文献19

  • 1姚富强,都基焱.通信系统的灰关联分析[J].电子学报,1994,22(7):61-67. 被引量:10
  • 2易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 3易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 4柯宏发,陈永光,刘波.电子装备试验方案的灰色优选模型及算法[J].电子学报,2005,33(6):995-998. 被引量:11
  • 5Feghhi J, Feghhi J, William P. Digital Certificates [ M]. Canada: Addison- Wesley,1998.
  • 6National Institute of Standards and Technology (NIST).Computer Security Division Systems and Network Security Group. Information Technology Security Assessment Framework[Z]. 2000.
  • 7Ortalo R, Deswartc Y, Kaaiche M. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security [R]. LAAS Report 96369, 1997-01
  • 8Dacier M, Deswarte Y, Kaaiche M. Quantitative Assessment of Operational Security: Models and Tools [R]. LAAS Research Report 96493, 1996-05
  • 9Cooper G. Computational Complexity of Probabilistic Inference Using Bayesian Belief Networks (Research Note) [ J ]. Artificial Intelligence,1990, 42 (2/3): 393-405
  • 10Russe L S,Niorvig P.Artificial Intelligence:A Modern Approach [M].Englewood Cliffs, NI: Prentice Hall, 1995

共引文献57

同被引文献196

引证文献24

二级引证文献155

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部