Font Size: a A A

Network Security Assessment Model Based On Rough Sets And Realization

Posted on:2012-11-06Degree:MasterType:Thesis
Country:ChinaCandidate:X G LiFull Text:PDF
GTID:2208330335496486Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, the internet has already become the vital vehicle for information dissemination globally. However, since after the advent of the internet, resource sharing and information security have turn into one pair of irreconcilable contradictions. The more and the wider internet information is shared, the more and the deeper information security problems are increasingly exposured. Therefore, traditional passive protection is not adaptable to the current security situation, and the theory of proactive network security assessment has been created accordingly. The favorable network security assessment can assist the management staff to comprehensively and precisely control the level of security, this makes a great importance to safeguard the internet to run smoothly.This dissertation analyses the security assessment requirements for a certain unit project, research the network security evaluation model based on rough set, and use this model for the design and experiment of the network safety assessment system. The first, we analysis of domestic and international network safety assessment of current situation, four common network safety assessment method and the main information security evaluation standard was summarized. In view of the current most network safety assessment system is hard to be the comprehensive understanding network security situation, the network security valuation of the rough sets and describes the fuzzy attribute decision table of the reduction method, puts forward a rough set theory based on mining network mass data implied in the rules of the algorithm, and the safety evaluation of the rules by building based on the rough set of network security evaluation model.Based on this, in view of some unit network security assessment to the specific requirements of the evaluation index and evaluation analysis process, the model is applied to this unit large computer network, the completion of the network security assessment system design and realization.Experimental result shows that, this model can effectively reduce the redundant attributes, meanwhile can determine the importance degree of attribute objectively according to the given data, consequently, it will reflect the network security tendency objectively, accurately and comprehensively, and it provides a good real value and a stronger operability to the continuous network security assessment work for the management department.
Keywords/Search Tags:Network security assessment, Risk assessment model, Rough set, Attribute reduction, Discretization of the continuous attribute
PDF Full Text Request
Related items