Paper
21 April 2022 A network attack evaluation model based on variable weight theory
Zhigeng Li, Bin Wu
Author Affiliations +
Proceedings Volume 12175, International Conference on Network Communication and Information Security (ICNCIS 2021); 1217503 (2022) https://doi.org/10.1117/12.2628559
Event: International Conference on Network Communication and Information Security (ICNCIS 2021), 2021, Beijing, China
Abstract
With the development of the network, people pay more and more attention to network security. Network attack assessment is a very important item in network security assessment. Starting from three aspects: network attack evaluation attribute index selection, index weight determination, and network attack evaluation model establishment, based on the shortcomings of existing evaluation methods, this paper proposes a variable weight evaluation algorithm and a network attack evaluation model based on TOPSIS. Spatio-temporal correlation attributes are introduced into the attack effect evaluation index system, and a method of fusion of constant weight and variable weight is proposed to determine the weight of the index system. While ensuring the rationality of the indicator system, the compensation mechanism between indicators is overcome. Finally, the algorithm was verified through simulation experiments, and the experimental results show that the algorithm improves the accuracy and effectiveness of the evaluation.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhigeng Li and Bin Wu "A network attack evaluation model based on variable weight theory", Proc. SPIE 12175, International Conference on Network Communication and Information Security (ICNCIS 2021), 1217503 (21 April 2022); https://doi.org/10.1117/12.2628559
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Networks

Network architectures

Statistical analysis

Algorithms

Computer simulations

Defense systems

Network security

Back to Top