节点文献

基于模糊层次分析法的网络信息安全评价研究

Research on the Evaluation of Network Information Security Based on the Fuzzy Analytic Hierarchy Process

【作者】 魏倩

【导师】 窦平安;

【作者基本信息】 吉林大学 , 情报学, 2008, 硕士

【摘要】 本文论述了网络信息安全现状、评价现状,以及网络信息安全评估标准,结合网络评价定性的、不确定性的因素较多的特征,本课题着重介绍了模糊层次分析法,论述了网络信息安全风险的评价步骤与过程,本文构造了一个新的网络信息安全评价指标体系NISEIS(Network Information Security Evaluation Index System),本体系由网络通信安全、安全制度、安全技术措施、物理安全、系统安全五个一级指标和20个二级评判指标作为网络信息安全的影响因子。分析了指标体系权重的建立原则以及权重的归一化处理方法,采用指标隶属函数模型,并且给定性指标各等级赋边界值,通过单因素模糊评价,给出了多级模糊综合评价模型。结合某局域网的实例分析给出了使用评价模型进行网络信息安全评价的步骤,评价结果与实际基本相符。最后,根据该模型,设计一个基于漏洞模拟攻击的网络信息安全评价系统。通过该评价系统,网络安全管理员可以及时发现系统存在的漏洞,并且采取相应的安全防御措施修补系统的漏洞,从而确保网络系统能够安全运行。

【Abstract】 Recent year, the computer network is increasingly playing important role in politics, the economy, the military, the social life and so on each field, but because the network has the connection form multiplicity, openness、interconnection so on trait, attack affairs which aim at network system frequently occur and cause network security to become an important aspect which is not allowed to neglect in the network construction.The history of Fuzzy Mathematics is not long. Fuzzy Mathematics has been used in many fields. It owes to that Fuzzy Mathematics opens out the fuzzy essence of the relations between things. The Security of network information relates to many factors such as information transmission, information storage and information management. The character and degree of all these relationship are fuzzy. So it is reasonable and scientific to use the method of fuzzy synthesis evaluation to analyze the security of network information. This paper constructs evaluation system for network information security. Administrator finds system vulnerability in time from the evaluation system. Some defensive measures are taken to ensure the network system operating safely and stably.The main contents of this study include the followings:Chapter1. Introduction. Firstly, the paper discusses the issue of background and significance of the study. Secondly, it reviews the currently domestic and overseas situation of research. Finally, it makes major research, the research methods and overall philosophy. Chapter2. This chapter introduces related theories on the evaluation of network information security, including the concept, basic requirements, target, evaluation criteria and evaluation method of network information security.Chapter3. Construction of evaluation index system for network information security. This chapter introduces the feasibility of network information security, analyses design concept and principles of index system of evaluation and constructs of evaluation index system for network information security.Chapter4. Evaluation Model of network information security based on the fuzzy analytic hierarchy process. This chapter introduces basic steps of AHP, analyses evaluation model of network information security based on fuzzy synthesis evaluation method.Chapter5. Example analysis of index system of evaluation. This chapter analysis on construction of a unit network based on fuzzy synthesis evaluation method, and also provides some efficient methods to protect network.Chapter6. Construction of evaluation system for network information security.This chapter introduces related technology of network information security evaluation. It analysis main architecture of network information security evaluation system. It constructs evaluation system for network information security.Chapter7. Conclusion and the prospects for future research. Making a study conclusion and giving the further study in the right direction. This paper described the current situation of network security,the current situation of network evaluation and the evaluation standard of the security of network information. Including TCSEC (Trusted Computer System Evaluation Criteria),which is a standard for computer security issued by the US government; ITSEC (the Information Technology Security Evaluation Criteria),which is a standard for computer security that was issued by the Europe,CC (Common Criterion),which is a world standard Computer security; GB/T18336-2001 is classified criteria for security protection of Computer information system in China.Many qualitative and uncertain factors of network evaluation considered,this paper introduces emphatically about Fuzzy Synthesis Evaluation Modeling Method of network. The evaluation step about network information security has been described. Synthesis Evaluation Index system can be established. Set up five first level indexes, such as communication security of the network, security system, safety technical measures, physical security, and system security. Corresponding to each first level index and set up second index. This paper analyzed the setting-up principle of the system weight of the index and weight normalization treatment method. I develop a network evaluation system according to the Fuzzy Synthesis Evaluation Method of network security. According to the one-level Fuzzy Evaluation Model, Multilevel Fuzzy Synthesis Evaluation Model of network security has been provided. Combining with the instance of network, the evaluation step of network information security by seeing of evaluating model, the result of evaluation is in conformity with reality. Finally, this paper constructs evaluation system for network information security. Administrator finds system vulnerability in time from the evaluation system. Some defensive measures are taken to ensure the network system operating safely and stably.

  • 【网络出版投稿人】 吉林大学
  • 【网络出版年期】2008年 10期
  • 【分类号】TP393.08
  • 【被引频次】25
  • 【下载频次】1800
节点文献中: 

本文链接的文献网络图示:

本文的引文网络