DocumentCode
3585540
Title
Vulnerability Threat Assessment Based on AHP and Fuzzy Comprehensive Evaluation
Author
Jiao Yue ; Ke Zhang
Author_Institution
Res. Inst. of Electron. Sci. & Technol., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Volume
2
fYear
2014
Firstpage
513
Lastpage
516
Abstract
The paper starts with the study of present methods for evaluation of Vulnerability Threat. It puts forward a new classification method to make up the insufficiency of key elements of assessment. It establish the index system by considering the aspects of time, environment and attack damages and so on. It proposes an assessment method based on Analytic Hierarchy Process (AHP) and fuzzy comprehensive evaluation, obtaining the factor weights by AHP, and quantifying the vulnerability based on the fuzzy comprehensive evaluation. At the end, it gives a practical example to prove that this method can be applied very well for vulnerability harm assessment.
Keywords
analytic hierarchy process; fuzzy set theory; security of data; AHP; analytic hierarchy process; classification method; factor weights; fuzzy comprehensive evaluation; vulnerability threat assessment; Availability; Communication networks; Complexity theory; Computers; Indexes; Process control; Security; analytic hierarchy process; fuzzy comprehensive evaluation; vulnerability assessment;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on
Print_ISBN
978-1-4799-7004-9
Type
conf
DOI
10.1109/ISCID.2014.231
Filename
7082042
Link To Document