Computer Engineering and Applications ›› 2012, Vol. 48 ›› Issue (21): 79-82.

Previous Articles     Next Articles

Network security evaluation algorithm based on extension theory

LI Jingzhi, YIN Xiaochuan, HU Tu, LI Mingxun   

  1. Institute of Telecommunication Engineering, Air Force Engineering University, Xi’an 710077, China
  • Online:2012-07-21 Published:2014-05-19

基于可拓理论的网络安全评估研究

李景智,殷肖川,胡  图,李明迅   

  1. 空军工程大学 电讯工程学院,西安 710077

Abstract: Aiming to the shortcoming of the existing network security evaluation algorithm, the network security evaluation algorithm is proposed based on extension analytic hierarchy process. Based on the fuzzy AHP method, combined with extension theory, the collected index values of questionnaires are mapped into corresponding calibration interval. Through the calculation of relative membership degree, a new decision matrix is constructed. The integrated weights of the network security index are calculated by the method of fuzzy AHP. The network security evaluation value is obtained by the weighted ranking of the relative membership degree. The case example shows the algorithm can take experts authority and questionnaires universality into account. The network security can be evaluated truly and effectively.

Key words: network security evaluation, extension theory, matter model, fuzzy Analytic Hierarchy Process(AHP)

摘要: 针对目前网络安全评估算法存在的不足,提出了一种基于可拓模糊层次分析的安全评估算法。该算法在模糊层次分析法的基础上,结合可拓理论,将调查问卷表收集到的指标值映射到可拓区间中,通过相对隶属度的计算,构建了新的判决矩阵,利用模糊层次分析法计算各指标的综合权重。通过对相对隶属度的加权排序,得到网络安全评估值。通过实例分析,说明该方法能综合考虑专家打分的权威性和调查问卷的普遍性,提高了网络安全评估的准确性和有效性。

关键词: 网络安全评估, 可拓理论, 物元模型, 模糊层次分析法