Font Size: a A A

Research And Application And Examination In Particular Instance Levels Of Network Security Risk Assessment

Posted on:2014-05-02Degree:MasterType:Thesis
Country:ChinaCandidate:J LiuFull Text:PDF
GTID:2268330401458104Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of computer, it not only brings the huge economic and social development, also makes the information security problem more and more remarkable. Under the condition of information, How to ensure non-repudiation of network, integrity, confidentiality and authenticity, that have become the main topics in the field of network security research.Research on network security level, model is the foundation and the algorithm designing is the core of the model part. There are many algorithm methods in previous studies evaluating. For example analytic hierarchy process、 event tree analysis、fault tree analysis、probability and risk analysis.This paper uses the analytic hierarchy process (ahp) as the main research method,and combines with the fuzzy complementary judgment matrix. I improve the mothd on the basis of the analytic hierarchy process (ahp). I combined the analytic hierarchy process and the consistent fuzzy complementary matrix to improve an analytic method. I’m going to split the middle tier into two layers,big elements layer and small elements layer. First of all,I target to determine the risk level of the big element layer. The second, I analysis the importance sorting in the small element layer. According to this study, I analysis the importance sorting in the small element layer once again to get the final events elements layer.In this paper, thesis is six chapters.The first chapter mainly introduces the paper’s background and characteristics of network security. The second chapter introduces the principle of network security risk assessment, the division of various risk factors in the risk assessment. The third to fifth chapter is the core chapter of this article. The third chapter introduces the theoretical background of risk assessment. In the fourth chapter, I put forward the improved grey ahp assessment model and algorithm. I use the proposed model to applicate and test a lab in fifth chapter. The sixth chapter is the summary for the whole thesis.For the purpose of this article improved algorithm, there is two main train of thoughts.First, due to network attack events is all the time, I consider the time By the attack and select three attack period to analysis. Second, when selecting risk factors, the sheer level analysis will reduce the effects of multi-level. And two layers will have certain effect between upper and lower.So I put forward the multi-level weighted analysis method.The last, I put the improved algorithm into use a virtual network laboratory. In accordance with the design of the algorithm, element analysis, and the calculation of the safe level, I verify that the algorithm is valid.
Keywords/Search Tags:Analytic hierarchy process(ahp), Fuzzy complementaryjudgment matrix, Level of risk, The weight
PDF Full Text Request
Related items