会议专题

A Network Security Evaluation Method based on FUZZY and RST

The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the comprehensive network security risks and take effective security measures. A network evaluation model and the corresponding fuzzy algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The model combined with the importance of the security measure, environment and the key nodes. The evaluation method based on RST is used to evaluate the key nodes and the fuzzy mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown by experimental results that this system provides a valuable model and algorithms to help to find the security rules, adjust the security measure, improve the security performance and design the appropriate security risk evaluation and management tools.

security risk evaluation rough set theory combination of vulnerabilities security situation data digging

Zhang Lijuan Wang Qingxian

National Digital Switching System Engineering and Technological Research Center Zhengzhou, Henan, China

国际会议

2010 2nd International Conference on Education Technology and Computer(第二届IEEE教育技术与计算机国际会议 ICETC 2010)

上海

英文

40-44

2010-06-22(万方平台首次上网日期,不代表论文的发表时间)