Research and implementation of security evaluation system for NGN

Author(s):  
Danfeng Yan ◽  
Fangchun Yang ◽  
Wenbin Wang
2014 ◽  
Vol 989-994 ◽  
pp. 5300-5303
Author(s):  
Hai Lin Guo ◽  
Zhi Ning Wang ◽  
Li Xin Zhang ◽  
Liu Xiao

Chinese expressway construction security situation is grim at present. Based on the index system, determining the importance of every factor on each level by the experts scoring method and 1-9 scale law. A expressway construction security evaluation system is designed and developed using Analytic Hierarchy Process (AHP) and the modern computer-aided technology, and finally validated. The results show that this system accurately indicated the safety situation of expressway construction, and realize systematism, standardization and automatization of safety evaluation.


2014 ◽  
Vol 686 ◽  
pp. 458-462
Author(s):  
Zi Yan Shi ◽  
Guo Lin Zhao ◽  
Qiao Lin Hu

The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security measure, improve the security performance and design the appropriate security risk evaluation and management tools.


2014 ◽  
Vol 1073-1076 ◽  
pp. 1023-1026
Author(s):  
Jiao Wang ◽  
Xin Zhang

Fuzzy mathematical evaluation method, is mainly rely on experience to determine the membership function for data processing. The water supply network security evaluation system is established based on network historical statistical data. A reasonable evaluation of urban water supply network in shanxi has been carried in the application of AHP to determine the factor weight of fuzzy mathematics.


2012 ◽  
Vol 482-484 ◽  
pp. 2390-2395
Author(s):  
De Qiang Li

In the paper, we establish an evaluation system in the study of four aspects such as people, regulation, equipment and technology management, field management and engineering construction. We present an entropy weight multi-level fuzzy comprehensive evaluation model in power plant security on the basis of reliability identification. Firstly, it identifies the reliability of power plant security evaluation system. Secondly, it can meet the condition that the system is reliable. Then it obtains the indicator weight of all levels in the evaluation system by the entropy weight method. Finally, it carries out a comprehensive evaluation in power plant security by the multi-level fuzzy evaluation method.


2021 ◽  
Vol 252 ◽  
pp. 01027
Author(s):  
Yanrong Jing ◽  
Wenqian Zhang ◽  
Lin Ge ◽  
Nanfang Li ◽  
Xiyuan Shang ◽  
...  

In order to ensure the effect of network data transmission in scientific research institutions and avoid network information from being attacked and damaged, a secure sharing method of network data transmission based on multi-layer encryption technology is proposed. Combined with multi-layer encryption technology, the network data transmission security protocol is constructed to ensure the security and integrity of the initial file. The network information transmission security evaluation system is further constructed. The network transmission path security of scientific research institutions is tracked, evaluated and tested in real time. The network data transmission security sharing platform is constructed to ensure the safe sharing of massive and complex data Experiments have proved that the security and sharing processing effect of the network data transmission security sharing method based on multi-layer encryption technology are significantly improved compared with the traditional methods, and fully meet the research requirements.


2014 ◽  
Vol 513-517 ◽  
pp. 768-771
Author(s):  
Bo Yun Zhang

This paper describes the basic models of network security state evaluation system and concentrates on researching the situation assessment method with stochastic model. In the paper, which makes use of the Hidden Semi-Markov Model (HsMM), tries to simulate the operation of network system. The alert statistics, deriving from network defense system, is used as data sources to realize the evaluation of network security situation. HsMM modifies the HMM model concerning the hypothesis of some state-duration time in relation to exponential distribution, which coincides the description of the network systems operation in the real world. The experimental results imply that HsMM is an ideal security evaluation method.


2012 ◽  
Vol 535-537 ◽  
pp. 2049-2052
Author(s):  
Dong Xiao Niu ◽  
Xin Lu ◽  
Huan Huan Qiao ◽  
Hui Juan Zhai

Based on detailed analysis of the influencing factors on energy security, this paper build the China's energy security evaluation index system considering energy transport from the four aspects of energy supply, energy consumption, energy, transport, energy and social environment, then classified the level of energy security according to the evaluation system. At last, this paper made an empirical analysis on the 2001-2010 energy security through the Analytic Hierarchy Process.


Sign in / Sign up

Export Citation Format

Share Document