Font Size: a A A

Fuzzy Comprehensive Evaluation Of Applied Research In The Evaluation Of Network Security

Posted on:2007-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:X H ZhangFull Text:PDF
GTID:2208360215498426Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The history of Fuzzy Mathematics is not long , but Fuzzy Mathematics has been used in many fields . It owes to that Fuzzy Mathematics opens out the fuzzy essence of the relations between things. The Security of network information relates to many factors such as information transmission , information storage and information management . The character and degree of all these relationship are fuzzy . So it is reasonable and scientific to use the method of fuzzy synthesis evaluation to analyse the security of network information.This paper presents the origin and current research state of fuzzy mathematics , discusses the method of fuzzy synthesis evaluation in detail , including fuzzy sets , the relation and difference between the fuzzy character and randomicity , the calculative model, the method of confirming the influencing weight and the degree of membership . By discussing the current state , concept, basic demand and the criterion of the security of network information , it leads to the use of fuzzy synthesis evaluation on the security of network information.This paper evaluates the security of network information by using two-level fuzzy synthesis evaluation method . It includes physical security , logical security and security management , three first-level indexes, and 26 second-level indexes . The method of Delphi is used to confirm the influencing weight and the degree of membership . At last the author gives an example of LAN and use two methods of fuzzy synthesis evaluation to compute the state of its information security . The conclusion is that the security state of the LAN's information is " good ".
Keywords/Search Tags:fuzzy synthesis evaluation, Circular membership function, network security
PDF Full Text Request
Related items