Font Size: a A A

The Research Of Information Security Assessment Method Based On Social Network Field Systems

Posted on:2019-12-13Degree:MasterType:Thesis
Country:ChinaCandidate:X Y WeiFull Text:PDF
GTID:2428330566459591Subject:Mathematics
Abstract/Summary:PDF Full Text Request
With the continuous upgrading of Internet technology,the growing popularity of the Internet,the relationship between human beings and the Internet is more and more intimate.They are forming a complex network society of network relationships.Therefore,the study of the safety of the network society has universal practical significance.In order to scientifically evaluate the security level of the network society,this paper puts forward the theory of the network social field system and follows the qualitative and quantitative analysis of research ideas,from the information system security risk assessment of the key issues to start.On the basis of the theory of the network social field system,the fuzzy comprehensive evaluation model and the gray comprehensive evaluation model are established by using the analytic hierarchy process,the cluster analysis method and the correlation analysis method to deal with the sample data.We take x on-line shopping operators as an example to verify the application value of three models and provide a new perspective and new method for the information security risk assessment of network social field system.The main work of this paper are:(1)Based on soft structure of sociology,the article proposed social network field systems theory.And we divide social network into levels following the steps of work in the theory of social network field systems.We assess security of the social network field system combining with the unique nature of the security of social network from the point of sociological.(2)We determine the weight of the index factors at all levels based on the analytic hierarchy process and conduct a consistency check to determine their rationality.We set up fuzzy mathematical mode to assess the security level of social network field systems.We assess network security from a new perspective of structure and integrity.(3)The fuzzy comprehensive evaluation model is established based on clustering analysis and correlation analysis method to determine the weight.The first model is based on cluster analysis method to process samples.The method eliminates samples of the expert weights that have the large deviation from the overall level to reduce the subjectivity of the individual and improve the accuracy.The second model is based on correlation analysis method to establish a comprehensive model to put comprehensive weights on the samples of experts weights which are selected from all samples to get make more accurate weights of safety evaluation indexes.The samples of experts weights which were processed by two models are reappliedto safety assessment fuzzy model of social Network Field Systems to make more accurate and reliable assessment results.(4)Determining the Weight based on analytic hierarchy process and establishing gray comprehensive evaluation model.Firstly,we use the analytic hierarchy process to determine the weight of the index factor,and then establish the gray comprehensive evaluation model based on the measure of whitening right function to evaluate the information security risk of the network social field system,and obtain the gray statistic value and the risk level of each factor under all indexes And the risk level.Then we use the way of layer-by-layer weighted evaluation to assess the security risk level of entire social network field systems.(5)Contrast and analysis of the three models,the conclusion shows that the three models have their own advantages and disadvantages.But they can make full use of the information contained in the evaluation of indicators with good operability and have certain reference value for actual work.
Keywords/Search Tags:Security Assessment, Fuzzy Comprehensive Evaluation, Gray Comprehensive Evaluation, Analytic Hierarchy Process, Cluster Analysis, Related Comprehensive Analysis
PDF Full Text Request
Related items