• DocumentCode
    3585540
  • Title

    Vulnerability Threat Assessment Based on AHP and Fuzzy Comprehensive Evaluation

  • Author

    Jiao Yue ; Ke Zhang

  • Author_Institution
    Res. Inst. of Electron. Sci. & Technol., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
  • Volume
    2
  • fYear
    2014
  • Firstpage
    513
  • Lastpage
    516
  • Abstract
    The paper starts with the study of present methods for evaluation of Vulnerability Threat. It puts forward a new classification method to make up the insufficiency of key elements of assessment. It establish the index system by considering the aspects of time, environment and attack damages and so on. It proposes an assessment method based on Analytic Hierarchy Process (AHP) and fuzzy comprehensive evaluation, obtaining the factor weights by AHP, and quantifying the vulnerability based on the fuzzy comprehensive evaluation. At the end, it gives a practical example to prove that this method can be applied very well for vulnerability harm assessment.
  • Keywords
    analytic hierarchy process; fuzzy set theory; security of data; AHP; analytic hierarchy process; classification method; factor weights; fuzzy comprehensive evaluation; vulnerability threat assessment; Availability; Communication networks; Complexity theory; Computers; Indexes; Process control; Security; analytic hierarchy process; fuzzy comprehensive evaluation; vulnerability assessment;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on
  • Print_ISBN
    978-1-4799-7004-9
  • Type

    conf

  • DOI
    10.1109/ISCID.2014.231
  • Filename
    7082042