A Design of the Network Security Evaluation System

2014 ◽  
Vol 686 ◽  
pp. 458-462
Author(s):  
Zi Yan Shi ◽  
Guo Lin Zhao ◽  
Qiao Lin Hu

The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security measure, improve the security performance and design the appropriate security risk evaluation and management tools.

2014 ◽  
Vol 8 (1) ◽  
pp. 766-771
Author(s):  
Shujuan Jin

Purpose: discuss the role of the neural network (NN) theory in the computer network security evaluation. Method: propose three-level and four-class indicator system suitable for network security evaluation, establish the network security evaluation system model based on NN, optimize the NN model by using the particle swarm, collect 100- group data on the computer network security evaluation of different scales via expert scoring, and normalize them; Result: the evaluation model based on NN is simple and practicable to network security evaluation and can eliminate disturbance of the subjective factors of the human being. The simulation results indicate that the system can reduce relative output error and improve correctness rate of evaluation. Conclusion: The NN model is very valuable in research on the computer network security evaluation system, which can offset weaknesses of the past evaluation methods to some extent, improve precision of the evaluation results, and provide reference to prediction and control of the network security problems in future.


2012 ◽  
Vol 482-484 ◽  
pp. 2390-2395
Author(s):  
De Qiang Li

In the paper, we establish an evaluation system in the study of four aspects such as people, regulation, equipment and technology management, field management and engineering construction. We present an entropy weight multi-level fuzzy comprehensive evaluation model in power plant security on the basis of reliability identification. Firstly, it identifies the reliability of power plant security evaluation system. Secondly, it can meet the condition that the system is reliable. Then it obtains the indicator weight of all levels in the evaluation system by the entropy weight method. Finally, it carries out a comprehensive evaluation in power plant security by the multi-level fuzzy evaluation method.


2014 ◽  
Vol 513-517 ◽  
pp. 768-771
Author(s):  
Bo Yun Zhang

This paper describes the basic models of network security state evaluation system and concentrates on researching the situation assessment method with stochastic model. In the paper, which makes use of the Hidden Semi-Markov Model (HsMM), tries to simulate the operation of network system. The alert statistics, deriving from network defense system, is used as data sources to realize the evaluation of network security situation. HsMM modifies the HMM model concerning the hypothesis of some state-duration time in relation to exponential distribution, which coincides the description of the network systems operation in the real world. The experimental results imply that HsMM is an ideal security evaluation method.


2014 ◽  
Vol 686 ◽  
pp. 470-473 ◽  
Author(s):  
Yi Bin Zhang ◽  
Ze Quan Yan

This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluation method based on BP neural network, and has designed to build the evaluation model, and shows that the method is feasible through the MATLAB simulation experiments.


2011 ◽  
Vol 474-476 ◽  
pp. 1440-1446
Author(s):  
Xiao Hu Ma

The last few years, research on network risk evaluation technique[1], and establishment of risk evaluation system facing integrity grade protection is the hot problem. There is great significance. The existing network safety valuation system exists many blemishes in science, and nationality, etc. Such as pole light, Nessus, Anluo network risk valuation system etc, they evaluate only from loophole scan or permeating test etc. There Lack important contents, for example, the safe grade and safety of target management strategy of the evaluation network. The standards, such as CC and OB 17859, OBIT 18336, OBIT 20984[2] etc ,are the outline requests , don't have easy operability. The existing network safety valuation methods and models, for example, network safety valuation model based on the discharge attack judges[3] , visit control model[4], network safety valuation model based on the diagram talks[5], all have blemish, there have a few evaluate objects, it's strong to limit, the function is bad. To resolve the above problem, this paper provides a model named NSEMML (Network Security Evaluation Model based on Multi-data and Layer), And a new risk evaluation system based on FNSEM is developed.


2013 ◽  
Vol 295-298 ◽  
pp. 749-754
Author(s):  
Heng Kang Ding ◽  
Jia Yang Wang ◽  
Chang Wu Zou ◽  
Lei Hu

An urban eco-security evaluation system of 18 cities in Sichuan province was established by using PSR (Pressure-Status-Response) method. In this research the parameterized combination operator model which is propitious to fuzzy inversion problem was selected to evaluate over the situation from 2005-2007, using the particle swarm optimization (PSO) to optimize the parameter of parameterized combination operator. The results show that Chengdu was in a relative safe state and the other 17 cities are in critical safe; total situation of eco-security in Sichuan during 2005-2007 keeps on improving. The results gain with our method is basically consistent with the actual situation. It is seen that the urban eco-security indexes and evaluation model in our research are both feasible and efficient to solve the eco-security evaluation.


2014 ◽  
Vol 556-562 ◽  
pp. 6207-6210 ◽  
Author(s):  
Hai Yan Chen

With the wide application of computer network, network security issues become increasingly prominent. Currently, the most commonly used network security evaluation method is risk assessment method, as well as to test and evaluation system of safety degree by software vulnerability scanning tools and so on. However, network security is related to computer, communication, physics, mathematics, biology, management, social, and many other fields, which is complicated system engineering. As a result, poor operational safety exist in the existing method, thus in this paper, the research of computer complex network reliability evaluation method based on GABP algorithm is put forward.


Author(s):  
Jin Han ◽  
Jing Zhan ◽  
Xiaoqing Xia ◽  
Xue Fan

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Also, different cloud users may have different security risk preferences, which makes it difficult for third party to consider all users' needs during evaluation. In addition, current security evaluation indexes for cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only by 12% and 30%. Conclusion: Our method can achieve consistent decision based on conflicting roles, high scalability and practicability for cloud security risk evaluation.


Sign in / Sign up

Export Citation Format

Share Document