A Network Security Evaluation Method based on FUZZY and RST
The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the comprehensive network security risks and take effective security measures. A network evaluation model and the corresponding fuzzy algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The model combined with the importance of the security measure, environment and the key nodes. The evaluation method based on RST is used to evaluate the key nodes and the fuzzy mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown by experimental results that this system provides a valuable model and algorithms to help to find the security rules, adjust the security measure, improve the security performance and design the appropriate security risk evaluation and management tools.
security risk evaluation rough set theory combination of vulnerabilities security situation data digging
Zhang Lijuan Wang Qingxian
National Digital Switching System Engineering and Technological Research Center Zhengzhou, Henan, China
国际会议
上海
英文
40-44
2010-06-22(万方平台首次上网日期,不代表论文的发表时间)