1. Fuzzy Comprehensive Evaluation Model of Computer Network Security and its Application
- Author
-
Jia Qiang E, Zhi Qiang Wang, Chen Tao, and Yan Huang
- Subjects
Neuro-fuzzy ,Network security ,business.industry ,Computer science ,Analytic hierarchy process ,General Medicine ,computer.software_genre ,Fuzzy logic ,Set (abstract data type) ,Matrix (mathematics) ,Institution (computer science) ,Fuzzy set operations ,Data mining ,business ,computer - Abstract
Network security assessment is a complex multi-criteria problem including both quantitative and qualitative factors. In this paper, taken the computer network security evaluation index for a research object, the judgment matrix of index weight was improved based on the fuzzy theory, and a new weight determination approach was proposed to make up the shortcomings of traditional weight determination method and highlight the fuzziness of expert judgment. Meanwhile using fuzzy theory to establish fuzzy evaluation matrix, then combine analytic hierarchy process to set up a fuzzy AHP evaluation model of the computer network security. At the final stage, a security assessment of the system of an institution’s network was to implement to demonstrate the feasibility of the evaluation model.
- Published
- 2014