A Kind of Network Security Evaluation Method Based on Local Variable Weight

2011 ◽  
Vol 474-476 ◽  
pp. 527-530
Author(s):  
Yu Jiao Wang ◽  
Hai Yun Lin

The basis to build effective network security protection is to reasonably evaluate on network security. Based on analysis on shortcomings of existing network security evaluation methods, the paper built network security evaluation index system according to CC specifications. The advantages of local variable weight comprehensive method were analyzed and the method of network security evaluation based on combination of AHP and local variable weight was presented. The evaluation example on some network elements indicates that the method evaluate on overall information security level, so that the evaluation result be objective and reasonable.

2014 ◽  
Vol 686 ◽  
pp. 470-473 ◽  
Author(s):  
Yi Bin Zhang ◽  
Ze Quan Yan

This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluation method based on BP neural network, and has designed to build the evaluation model, and shows that the method is feasible through the MATLAB simulation experiments.


2014 ◽  
Vol 686 ◽  
pp. 458-462
Author(s):  
Zi Yan Shi ◽  
Guo Lin Zhao ◽  
Qiao Lin Hu

The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security measure, improve the security performance and design the appropriate security risk evaluation and management tools.


2012 ◽  
Vol 170-173 ◽  
pp. 3436-3439
Author(s):  
Xiao Hui Hou ◽  
Lei Huang ◽  
Xue Fei Li

The scientific research achievements are evaluated based on the BP neural network method which is developed in this paper. According to the analysis and consult with the well-known experts, set up the evaluation index system of scientific research achievements, and based on it, the BP neural network model which is used to evaluate the scientific research achievements is established. Through an actual example, in order to improve the solution efficiency, use the Matlab software to solve the model and get the evaluation result of the scientific research achievements in the example. The evaluation result has high accuracy and could meet the basic actual needs. The evaluation method which is set up in this paper will benefit to our country's evaluation index system of the scientific research achievements and will promote the development of evaluation methods of the scientific research achievements.


2014 ◽  
Vol 513-517 ◽  
pp. 768-771
Author(s):  
Bo Yun Zhang

This paper describes the basic models of network security state evaluation system and concentrates on researching the situation assessment method with stochastic model. In the paper, which makes use of the Hidden Semi-Markov Model (HsMM), tries to simulate the operation of network system. The alert statistics, deriving from network defense system, is used as data sources to realize the evaluation of network security situation. HsMM modifies the HMM model concerning the hypothesis of some state-duration time in relation to exponential distribution, which coincides the description of the network systems operation in the real world. The experimental results imply that HsMM is an ideal security evaluation method.


2014 ◽  
Vol 644-650 ◽  
pp. 5981-5985
Author(s):  
Yan Li Lv ◽  
Shuang Xiang ◽  
Yuan Long Li ◽  
Chun He Xia

Internet is inundated with large amount of intrusion, attack and other security incidents, which have posed a serious threat to network security. Security evaluation is one of the important management means throughout the life cycle of information system; it is also a basis and premise of formulating and adjusting the security strategies. Accurately predicting the impending security incidents and evaluating the possible degree of detriment are the decision-making foundation in network security defense. In this paper, a hierarchical detriment evaluation method of security incidents is put forward, after direct detriment is calculated ,indirect detriment of the incidents is calculated based on service dependence and permission transfer relations, and then, the overall detriment of security incidents is obtained.


2012 ◽  
Vol 241-244 ◽  
pp. 379-383
Author(s):  
Hong Qiang Gu ◽  
Cheng Zhang ◽  
Quan Shi

Equipment maintenance support capability is an important part of operational capability and the evaluation of equipment maintenance support capability is very important to the establishment of battle effectiveness. Cloud theory is applied to equipment maintenance support capability evaluation on basis of the establishment of the evaluation index system of equipment support capability. The application steps of cloud barycenter evaluation method to equipment maintenance support capability evaluation are analyzed. The evaluation result is achieved using weighted deflection degree which is used to demonstrate the deflection degree between equipment maintenance support capability and its perfect state. The correctness and validity of the proposed method is verified by the calculating result, which provide an efficient method for equipment maintenance support capability evaluation.


2018 ◽  
Vol 232 ◽  
pp. 03041
Author(s):  
Yuze Su ◽  
Zichun Liu ◽  
Kai Gao ◽  
Guangyu Na ◽  
Shuxin Liu

AC contactor state evaluation is a challenging problem. This paper proposes an AC contactor state assessment method based on variable weight coefficient. Firstly, the characteristic indicators that have a great influence on the state of the AC contactor are selected, and the state evaluation index system is established. Secondly, using the subjective and objective combination weighting method combined with the analytic hierarchy process and the grey relational analysis method, the constant weight coefficient is obtained, and the variable weight coefficient method with the equalization function is introduced to obtain the variable weight coefficient of each characteristic parameter. Finally, the fuzzy comprehensive evaluation method is used to evaluate the running state of the AC contactor. The experimental results show that the state evaluation method proposed in this paper can accurately reflect the real state of the AC contactor operation and effectively improve the reliability of the power system.


Sign in / Sign up

Export Citation Format

Share Document