Font Size: a A A

Technology And Implement On Configuration And Evaluation Of Index System Of Network Security

Posted on:2011-11-18Degree:MasterType:Thesis
Country:ChinaCandidate:F LiuFull Text:PDF
GTID:2178330338490039Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the deteriorating situation of network security, analysis and evaluation of situation of network security are being concerned by people. Now days, index system with a organizational structure are used by some systems to evaluated situation of network security. The index system collect and process data about network security, and then it produces quantified value about situation of network security after computing. Single and unchanged index system is not adjust to the network environment which is complex. Therefore a configuration system of index system is needed to be used to configure and modify the index system. Simultaneously in order to ensure the correct value about situation of network security, rationality of the index system is very important.In order to deal with problem above, I did some research about the features of index system of network security which are in common used in these days and analyze the configurability of index system firstly. On the basis of this research I constructed the mathematical model for importance of index and the method to extract configurable part in a index system. And then, I designed and had achieved a subsystem for configuration of index system in YHSAS. At the same time, I developed evaluation standards to evaluate rationality of index system of network security. Besides that, I developed mathematical model for evaluation and method for producing test data sets on the basis of informed research. After finishing above work, I compare the model and method developed in this paper with others using test data sets in experiment. After all, I combined the evaluation of rationality of index system with the subsystem for configuration of index system and gain rational index system after reconfigure it according to the evaluation conclusion.
Keywords/Search Tags:Network Security, Configuration of Index System, Evaluation of rationality of Index System, Dynamic Arithmetic Library, test data sets
PDF Full Text Request
Related items