Font Size: a A A

Network Security Risk Assessment Research Based On Computer Vulnerabilities

Posted on:2011-07-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y WeiFull Text:PDF
GTID:2178360305987522Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In this paper, according to the analysis of critical theory and technology of risk assessment, network security risk assessment based on vulnerabilities is researched. Through analysis and comparison of vulnerability database both at home and abroad, the needed vulnerability database for the research is built. Algorithm M-Apriori mining multidimensional association rule is designed through analyzing and improving association rule classical mining algorithm Apriori. According to association rules in vulnerabilities, risk network on the basis of risk-spreading algorithm RNS is built. The heuristic A *algorithm is applied to optimize the network and obtain the key node set. The paper also offers some cases to demonstrate the risk assessment model constructed. A risk assessment analysis system based on vulnerabilities is realized with functions of risk network building and key node set obtaining.
Keywords/Search Tags:network security, risk assessment, vulnerability, risk proliferation, key node set
PDF Full Text Request
Related items