期刊文献+

一种基于灰色层次分析法的网络攻击危害性评估指标量化方法 被引量:5

Quantification Method of Evaluation Index for Network-attacking Hazard Based on Gray AHP
下载PDF
导出
摘要 针对目前计算机网络攻击危害性评估指标多处于定性分析,无法满足网络风险定量评估要求的现状,在传统层次分析法(AHP)的基础上,结合灰色理论提出了一种基于灰色AHP的网络攻击危害性评估指标量化方法,对网络攻击危害性影响因素按照目标层、准则层、因素层等层次结构进行分类,建立起一套具有多级、分布式的网络攻击效果评估指标体系,并将灰色理论应用于指标权重分配计算过程中,降低了传统AHP评估时的主观性影响,从而为网络攻击危害性评估提供了全面合理、可量化的评估依据. In light of the fact that evaluation index of network-attacking hazards were often used to qualita- tive analysis, which can not meet the requirement of quantitative analysis for network-attacking hazards, based on the traditional AHP assessment methods, combining the gray theory, a quantification method of evaluation index of network-attacking hazards was proposed based on the gray AHP model, in which factors impacting network attacking hazards were classified from target layer, rule layer, layer factors and so on and a multi-level, distributed evaluation index system for the network attacking effects was established. The Grey theory was applied to process of index weight distribution calculation, which reduces the subjective impacts which appear when used traditional AHP to evaluate, and provides a comprehensive, reasonable and quanti- fiable basis for the harm evaluation of network attacking hazards.
出处 《成都大学学报(自然科学版)》 2012年第1期57-60,共4页 Journal of Chengdu University(Natural Science Edition)
基金 四川省应用基础研究计划(2009JY0112) 成都大学校科技基金(2010XJZ35)资助项目
关键词 网络安全 网络攻击评估指标 层次分析法 灰色理论 network security evaluation indicators attacks AHP Gray theory
  • 相关文献

参考文献7

二级参考文献29

  • 1[1]Lindqvist U.On the Fundamentals of Analysis and Detection of Computer Misuse.Ph.D.Thesis,Department of Computer Engineering,Chalmers University of Technology,Gteborg, Sweden, 1995
  • 2[2]Kumer S.Classification and Detection of Computer IntrusionsPhD.Thesis,Purdue U niversity,West La fayette, Indiana, 1995-08
  • 3[3]Roesch M.Snort Docment and Sourcecode.http:∥www.snort.org.
  • 4[4]Survival Acceptability Evaluation and Incident Case Report in Taiwan.http:∥www.cer t.org.tw.
  • 5鲜明 等.国家自然基金报告[R].长沙:国防科技大学,2003.7-33.
  • 6胡影.[D].长沙:国防科技大学,2003,5-31.
  • 7Satty T L. How to Make a Decision:The Analytic Hierarchy Process[J]. European Journal of Operational Research, 1990,1(48):9-26.
  • 8Miksell S, Nainis W S, James H M. Security Vulnerability Assessment Tools for Internet Applications[R]. White Paper, Information Technology Support Center, 2001.
  • 9The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation-Part 1:Introduction and General Model, ISO/IEC 15408-1:1999(E)[S]. 1999.
  • 10The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation-Part 2:Security Function Requirements, ISO/IEC 15408-2:1999(E)[S]. 1999.

共引文献119

同被引文献52

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部