• DocumentCode
    3590797
  • Title

    Study on assessment method for computer network security based on rough set

  • Author

    Kong, Lisha ; Ren, Xiaofei ; Fan, Yongjian

  • Author_Institution
    Artillery Command Acad. of PLA, Xuanhua, China
  • Volume
    3
  • fYear
    2009
  • Firstpage
    617
  • Lastpage
    621
  • Abstract
    As the traditional network security assessment methods have subjective factors when the weights a assessment indexes are identified, it is difficult to make accurate and objective assessment. However, the Rough set theory has the advantages of not needing apriori knowledge when dealing with uncertain problems. Therefore, the application of the Rough set theory in network security assessment is quite necessary. This paper is identifies the principle of assessment indexes system of network security and establishes the indexes system of network security assessment, establishes security assessment model and common steps of network security assessment which are both based on the Rough set theory, and finally analyzes and validates this model by an example. The network security assessment based on the Rough set theory effectively overcomes the subjectivity of determining the weights of indexes by traditional methods, gives more objective results, and enhances the veracity and validity of network security assessment.
  • Keywords
    computer network security; cryptography; rough set theory; assessment method; computer network security; rough set theory; Computer networks; Computer security; Decision support systems; Virtual reality; Rough set theory; network; security assessment model; weights;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Computing and Intelligent Systems, 2009. ICIS 2009. IEEE International Conference on
  • Print_ISBN
    978-1-4244-4754-1
  • Electronic_ISBN
    978-1-4244-4738-1
  • Type

    conf

  • DOI
    10.1109/ICICISYS.2009.5358114
  • Filename
    5358114