首页 | 本学科首页   官方微博 | 高级检索  
     

基于可拓理论的网络安全评估研究
引用本文:李景智,殷肖川,胡图,李明迅. 基于可拓理论的网络安全评估研究[J]. 计算机工程与应用, 2012, 48(21): 79-82,88
作者姓名:李景智  殷肖川  胡图  李明迅
作者单位:空军工程大学电讯工程学院,西安,710077
基金项目:陕西省自然科学基金(No.SJ08-ZT15)
摘    要:针对目前网络安全评估算法存在的不足,提出了一种基于可拓模糊层次分析的安全评估算法。该算法在模糊层次分析法的基础上,结合可拓理论,将调查问卷表收集到的指标值映射到可拓区间中,通过相对隶属度的计算,构建了新的判决矩阵,利用模糊层次分析法计算各指标的综合权重。通过对相对隶属度的加权排序,得到网络安全评估值。通过实例分析,说明该方法能综合考虑专家打分的权威性和调查问卷的普遍性,提高了网络安全评估的准确性和有效性。

关 键 词:网络安全评估  可拓理论  物元模型  模糊层次分析法

Network security evaluation algorithm based on extension theory
LI Jingzhi , YIN Xiaochuan , HU Tu , LI Mingxun. Network security evaluation algorithm based on extension theory[J]. Computer Engineering and Applications, 2012, 48(21): 79-82,88
Authors:LI Jingzhi    YIN Xiaochuan    HU Tu    LI Mingxun
Affiliation:Institute of Telecommunication Engineering,Air Force Engineering University,Xi’an 710077,China
Abstract:Aiming to the shortcoming of the existing network security evaluation algorithm,the network security evaluation algorithm is proposed based on extension analytic hierarchy process.Based on the fuzzy AHP method,combined with extension theory,the collected index values of questionnaires are mapped into corresponding calibration interval.Through the calculation of relative membership degree,a new decision matrix is constructed.The integrated weights of the network security index are calculated by the method of fuzzy AHP.The network security evaluation value is obtained by the weighted ranking of the relative membership degree.The case example shows the algorithm can take experts authority and questionnaires universality into account.The network security can be evaluated truly and effectively.
Keywords:network security evaluation  extension theory  matter model  fuzzy Analytic Hierarchy Process(AHP)
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号