CN107944702A - A kind of network security step analysis appraisal procedure, device and computer-readable recording medium - Google Patents
A kind of network security step analysis appraisal procedure, device and computer-readable recording medium Download PDFInfo
- Publication number
- CN107944702A CN107944702A CN201711185503.0A CN201711185503A CN107944702A CN 107944702 A CN107944702 A CN 107944702A CN 201711185503 A CN201711185503 A CN 201711185503A CN 107944702 A CN107944702 A CN 107944702A
- Authority
- CN
- China
- Prior art keywords
- mrow
- msub
- factor
- evaluation
- grey
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Abstract
The invention discloses a kind of network security step analysis appraisal procedure, device and computer-readable recording medium, this method to comprise the following steps:The security risk assessment index of one group of computer network information system that can reflect Recurison order hierarchy model is built, security risk assessment index is destination layer, rule layer and indicator layer respectively;The weight for determining each assessment factor Vij in rule layer and indicator layer is compared according to weight standard database, and assigns each mono- quantized value dij of assessment factor Vij in indicator layer, and confidence level adjustment is carried out to quantized value dij using D S evidence theories;Grey class division is carried out to factor of evaluation Vij according to risk class database, and each grey class is represented using white function, is calculated with reference to quantized value dij and obtains grey evaluation weight vector rijs of the factor of evaluation Vij for all kinds of grey classes;The grey risk assessment weight matrix Ri formed according to factor of evaluation Vij corresponding weight aij and grey evaluation weight vector rij calculates the risk evaluation results Bij for obtaining indicator layer.
Description
Technical field
The present invention relates to computer network security technology field, and in particular to a kind of network security step analysis assessment side
Method, device and computer-readable recording medium.
Background technology
As computer technology, the quick improvement of Internet technology and development, social informatization degree are persistently lifted, formed
The information-intensive society of global integration, therefore cause the people to increase sharply the degree of dependence of computer network, computer network
The importance of information security is also increasingly valued by the people.Computer network own routine work, life and through in people
Become one of important instrument during habit, in view of the opening of computer network, sharing and convenience, computerized information net
Network to work for people, living and studying brings great convenience while, also for society bring larger threat, especially
It is that the use to computer network information is brought with new period computer network hacker, wooden horse, virus and artificial destruction etc.
Great security threat.
In face of the information security of computer network demand of rapid growth, only from passive defense technique etc. without
Method meets the requirement of network security, and can not fundamentally solve network security missile defense, and the safety of information system needs
Comprehensively to carry out prevention and control.Therefore, it is current can effectively to analyze network information system for information security of computer network risk assessment
With following risk development trend, threat and its influence degree that these risks are brought to information security of computer network are assessed,
It is convenient preferably to formulate Prevention-Security strategy, the operational support of safety is provided for the calculatingization network information.At present, computer network
Evaluation of Information System Security Risk mainly includes qualitative analysis, quantitative analysis and hybrid analysis Three models, especially level point
Analysis method, it can effectively assess safety existing for computer network information system as a kind of Quantitative Risk Assessment method
Loophole or risk problem, achieve preferable effect, in step analysis implementation process, although Hierarchy Analysis Method can
The objectivity of its risk assessment is effectively improved, but since information security of computer network influence factor is more, causes scale work
Measure very big, therefore be very easy to cause scale to judge to occur chaotic, it is zero or the situation of negative value to ignore scale value, flower
Take the uniformity that more energy discusses judgment matrix, it is impossible to sufficiently consider the reasonability of judgment matrix.
The content of the invention
It is an object of the invention to provide a kind of network security step analysis appraisal procedure, device and computer-readable storage
Medium, it is very big to solve existing Hierarchy Analysis Method scale workload, easily cause scale to judge confusion occurs, it is impossible to
It is zero or the problem of the situation of negative value to take into full account scale value.
To solve the above-mentioned problems, by analyzing existing method for evaluating information system risk, fixation analysis side is summarized
Relation and advantage and disadvantage between method, method for qualitative analysis, it is proposed that a kind of improvement layer based on gray theory and D-S evidence theory
Secondary risk analysis method, establishes an effective Analytic Hierarchy Process Model, more objectively, comprehensively can obtain information system and deposit
Risk, for information system defence provide decision support.
Specifically, the present invention provides a kind of network security step analysis appraisal procedure, this method comprises the following steps:
Assessment factor mark, weight and the risk class data of network security assessment are gathered, form weight normal data
Storehouse and risk class database, build the security risk of one group of computer network information system that can reflect Recurison order hierarchy model
Evaluation index, the security risk assessment index are destination layer, rule layer and indicator layer respectively;
Compared according to the weight standard database and determine each assessment factor Vij in the rule layer and the indicator layer
Weight, and assign each mono- quantized value dij of assessment factor Vij in the indicator layer, and using D-S evidence theory to institute
State quantized value dij and carry out confidence level adjustment;
Grey class division is carried out to the factor of evaluation Vij according to the risk class database, and each grey class is utilized
White function represents, is calculated with reference to the quantized value dij and obtains grey evaluation power of the factor of evaluation Vij for all kinds of grey classes
Vectorial rij;
The grey risk formed according to the corresponding weight aij of the factor of evaluation Vij and grey evaluation weight vector rij
Evaluate weight matrix Ri and calculate the risk evaluation results Bij for obtaining the indicator layer.
Further, it is corresponding according to risk factors in the risk evaluation results Bij of the indicator layer and the rule layer
Weight Ai, calculates the risk evaluation results O for obtaining the rule layer.
Further, the rule layer and the indicator layer according to the risk class database by corresponding grey class according to
Different values is given etc. grading row Fu, the grey class hierarchy of various evaluations is described using a grade adele C;Utilize formula:W=O
×CTIt can be calculated computer network information system comprehensive assessment result W.
It is apparent that if W result of calculations are bigger, represent that computer network information system security risk is higher.
Further, described compared according to the weight standard database is determined in the rule layer and the indicator layer often
The specific steps of the weight of one assessment factor Vij include:
According to each assessment factor mark in the weight standard database and history weighted data by the index
Each assessment factor Vij divided ranks in layer, and each grade uses the integer representation between [1,10], according to
Satty rules will determine that the standard degree of matrix is divided into 5 grades according to actual conditions;
Each assessment factor Vij carries out quantitative analysis in the corresponding indicator layer, and determines that the assessment factor Vij's is general
Rate Distribution Value nkij (hx), the probability distribution value form a score value probability matrix;
The probability distribution value nkij (hx) of the assessment factor Vij is integrated using D-S evidence theory, utilizes formula nij
(h)=n1ij (h1) × 1+n2j (h2) × 3+n3ij (h3) × 5+n4ij (h4) × 7+n5ij (h5) × 9, which is calculated, obtains institute's commentary
Estimate the significance level nij (h) of factor Vij;
Calculated by formula aij=nij (h)/∑ nij (h) and obtain the corresponding weight aij of the factor of evaluation Vij, at the same time
The corresponding weight Ai of risk factors in the rule layer is obtained by accumulation calculating.
Further, it is described to assign each mono- quantized value dij of assessment factor Vij in the indicator layer, and utilize D-S
The step of evidence theory carries out confidence level adjustment to the quantized value dij specifically includes:
History score data in the weight standard database carries out risk assessment to the assessment factor Vij and comments
Point, and fraction levels are divided into 5 levels, and assign the assessment factor Vij and correspond to the basic of the risk assessment scoring
Belief assignment mkij (xh);
Basic reliability distribution mkij (xh) is adjusted using D-S evidence theory, and passes through grey topology degree synthetic method
Then integrate and obtain the belief assignment mij (xh) that the assessment factor Vij corresponds to the risk assessment scoring;
Pass through formula:Dij=m1 (x1) × 1+m2 (x2) × 3+m3 (x3) × 5+m4 (x4) × 7+m5 (x5) × 9, calculates
Obtain the corresponding quantized value dij of the assessment factor Vij.
Further, it is described to carry out grey class division to the factor of evaluation Vij according to the risk class database and right
Each ash class is represented using white function, is calculated with reference to the quantized value dij and is obtained the factor of evaluation Vij for all kinds of grey classes
Grey evaluation weight vector rij the step of specifically include:
It is according to the grade scale of the factor of evaluation Vij of the risk class database, the factor of evaluation Vij is corresponding
Risk assessment is divided into 4 grey classes, and each grey class sequence number is represented with ei;4 grey classes are outstanding (safety), good (one
As safety), it is medium (risky) and poor (excessive risk).
As e=1, the white function is:
As e=2, the white function is:
As e=3, the white function is:
As e=4, the white function is:
Utilize formula
Calculate and obtain the grey evaluation power reij that the factor of evaluation Vij corresponds to e classes, obtain the factor of evaluation Vij
For the grey evaluation weight vector rij=(r1ij, r2ij, r3ij, r4ij) of all kinds of grey classes.
Based on same inventive concept, another aspect of the present invention, there is provided a kind of network security step analysis apparatus for evaluating,
The network security step analysis apparatus for evaluating includes processor, memory and data/address bus;
The data/address bus is used for realization the connection communication between processor and memory;
The processor is used to perform the network security step analysis appraisal procedure stored in memory, to realize following step
Suddenly:
Assessment factor mark, weight and the risk class data of network security assessment are gathered, form weight normal data
Storehouse and risk class database, build the security risk of one group of computer network information system that can reflect Recurison order hierarchy model
Evaluation index, the security risk assessment index are destination layer, rule layer and indicator layer respectively;
Compared according to the weight standard database and determine each assessment factor Vij in the rule layer and the indicator layer
Weight, and assign each mono- quantized value dij of assessment factor Vij in the indicator layer, and using D-S evidence theory to institute
State quantized value dij and carry out confidence level adjustment;
Grey class division is carried out to the factor of evaluation Vij according to the risk class database, and each grey class is utilized
White function represents, is calculated with reference to the quantized value dij and obtains grey evaluation power of the factor of evaluation Vij for all kinds of grey classes
Vectorial rij;
The grey risk formed according to the corresponding weight aij of the factor of evaluation Vij and grey evaluation weight vector rij
Evaluate weight matrix Ri and calculate the risk evaluation results Bij for obtaining the indicator layer;
According to the corresponding weight Ai of risk factors in the risk evaluation results Bij of the indicator layer and the rule layer, meter
Calculate the risk evaluation results O for obtaining the rule layer;
The rule layer and the indicator layer carry out corresponding grey class according to grade according to the risk class database
Fu gives different values, and the grey class hierarchy of various evaluations is described using a grade adele C;Utilize formula:W=O × CTCalculate
It can obtain computer network information system comprehensive assessment result W.
Based on same inventive concept, another aspect of the present invention, there is provided a kind of computer-readable recording medium, the meter
Network security step analysis appraisal procedure, the network security step analysis appraisal procedure are stored with calculation machine readable storage medium storing program for executing
The step of above-mentioned network security step analysis appraisal procedure is realized when being executed by processor.
The beneficial effect of technical solution of the present invention:
Network security step analysis appraisal procedure, device and the computer-readable recording medium of the present invention, by introducing ash
The theoretical improvement level methods of risk assessment with D-S evidence theory of color, establishes an effective Analytic Hierarchy Process Model, can be more
Objectively, risk existing for information system is comprehensively obtained, is provided decision support for information system defence., this method can be complete
Into network security risk dynamic evaluation process, the accuracy of assessment can greatly be improved, meets the actual need of network security
Ask;By in improved Hierarchy Analysis Method appliance computer network information system evaluation process, computer can be preferably found
The risk factors implied in network information system, it is comprehensive to be on the defensive and improve network operation index.
Brief description of the drawings
Fig. 1 the present embodiments relate to computer network information system security risk assessment factor index system.
A kind of Fig. 2 network security step analysis appraisal procedure FB(flow block)s provided in an embodiment of the present invention.
Provided in an embodiment of the present invention compared according to the weight standard database of Fig. 3 determines the rule layer and the finger
Mark the specific steps FB(flow block) of the weight of each assessment factor Vij in layer.
Fig. 4 is provided in an embodiment of the present invention to assign each mono- quantized value dij of assessment factor Vij in the indicator layer,
And the step idiographic flow block diagram of confidence level adjustment is carried out to the quantized value dij using D-S evidence theory.
A kind of Fig. 5 network security step analysis apparatus for evaluating structure diagrams provided in an embodiment of the present invention.
Embodiment
Following embodiments are used to illustrate the present invention, but are not limited to the scope of the present invention.
Embodiment 1
As shown in Fig. 2, the present invention provides a kind of network security step analysis appraisal procedure, this method includes following step
Suddenly:
S101, assessment factor mark, weight and the risk class data for gathering network security assessment, form weight standard
Database and risk class database, build the safety of one group of computer network information system that can reflect Recurison order hierarchy model
Risk assessment index, the security risk assessment index are destination layer, rule layer and indicator layer respectively;
As shown in Figure 1, computer network information system security risk is destination layer, rule layer include information system assets,
Information system access controls and information system communication and operation;Indicator layer include influence intangible asset, influence physical assets, its
His assets;Network users management, user's Access Management Access, application access management, system are accessed to be monitored with application;Malware is prevented
Control, media handling and safety, operation sequence and responsibility, network management, information exchange etc. with software and hardware.
S102, compared according to the weight standard database determine in the rule layer and the indicator layer each assessment because
The weight of plain Vij, and each mono- quantized value dij of assessment factor Vij in the indicator layer are assigned, and utilize D-S evidences reason
Confidence level adjustment is carried out by the quantized value dij;
S103, carry out the factor of evaluation Vij according to the risk class database grey class division, and to each grey class
Represented using white function, calculate the acquisition factor of evaluation Vij with reference to the quantized value dij comments for the grey of all kinds of grey classes
Valency weight vector rij;
S104, the ash formed according to the corresponding weight aij of the factor of evaluation Vij and grey evaluation weight vector rij
Color risk assessment weight matrix Ri calculates the risk evaluation results Bij for obtaining the indicator layer.
Wherein, according to the corresponding weight of risk factors in the risk evaluation results Bij of the indicator layer and the rule layer
Ai, calculates the risk evaluation results O for obtaining the rule layer.
Wherein, the rule layer and the indicator layer according to the risk class database by corresponding grey class according to grade
Different values is given into row Fu, the grey class hierarchy of various evaluations is described using a grade adele C;Utilize formula:W=O × CT
It can be calculated computer network information system comprehensive assessment result W.
It is apparent that if W result of calculations are bigger, represent that computer network information system security risk is higher.
As shown in figure 3, described compared according to the weight standard database is determined in the rule layer and the indicator layer
The specific steps of the weight of each assessment factor Vij include:
S201, according to each assessment factor mark in the weight standard database and history weighted data will described in
Each assessment factor Vij divided ranks in indicator layer, and each grade uses the integer representation between [1,10], according to
Satty rules will determine that the standard degree of matrix is divided into 5 grades according to actual conditions;
Shown in table 1 specific as follows;
Table 1
The standard degree fraction levels of judgment matrix | Fraction index Fuzzy level | Fraction value |
It is general important | 0,2 | 1 |
It is somewhat important | 2,4 | 3 |
It is obvious important | 4,6 | 5 |
It is strong important | 6,8 | 7 |
It is extremely important | 8,10 | 9 |
Each assessment factor Vij carries out quantitative analysis in S202, the corresponding indicator layer, and determines the assessment factor
The probability distribution value nkij (hx) of Vij, the probability distribution value form a score value probability matrix;
S203, the probability distribution value nkij (hx) using the D-S evidence theory integration assessment factor Vij, utilize public affairs
Formula nij (h)=n1ij (h1) × 1+n2j (h2) × 3+n3ij (h3) × 5+n4ij (h4) × 7+n5ij (h5) × 9, which is calculated, to be obtained
The significance level nij (h) of the assessment factor Vij;
S204, calculate the corresponding weights of the acquisition factor of evaluation Vij by formula aij=nij (h)/∑ nij (h)
Aij, while the corresponding weight Ai of risk factors in the rule layer is obtained by accumulation calculating.
It is specifically, as shown in table 2 below,
Table 2
As shown in figure 4, described assign each mono- quantized value dij of assessment factor Vij in the indicator layer, and utilize D-
The step of S evidence theories carry out confidence level adjustment to the quantized value dij specifically includes:
S301, the history score data in the weight standard database carry out risk to the assessment factor Vij
Assessment scoring, and fraction levels are divided into 5 levels, and assign the assessment factor Vij and correspond to the risk assessment scoring
Basic reliability distribution mkij (xh);
Specifically, it is as shown in table 3 below:
Table 3
Risk assessment grade | Fraction index Fuzzy level | Fractional value |
Low-risk | 0,2 | 1 |
Compared with low-risk | 2,4 | 3 |
Medium risk | 4,6 | 5 |
High risk | 6,8 | 7 |
Excessive risk | 8,10 | 9 |
S302, using D-S evidence theory be adjusted basic reliability distribution mkij (xh), and is closed by grey topology degree
Integrated into rule and obtain the belief assignment mij (xh) that the assessment factor Vij corresponds to the risk assessment scoring;
S303, pass through formula:Dij=m1 (x1) × 1+m2 (x2) × 3+m3 (x3) × 5+m4 (x4) × 7+m5 (x5) × 9,
Calculate and obtain the corresponding quantized value dij of the assessment factor Vij.
Wherein, grey class division is carried out to the factor of evaluation Vij according to the risk class database, and to each grey class
Represented using white function, calculate the acquisition factor of evaluation Vij with reference to the quantized value dij comments for the grey of all kinds of grey classes
The step of valency weight vector rij, specifically includes:
According to the grade scale of the factor of evaluation Vij of the risk class database, by Vij pairs of the factor of evaluation
The risk assessment answered is divided into 4 grey classes, and each grey class sequence number is represented with ei;4 grey classes are outstanding (safety), well
(Generally Recognized as safe), medium (risky) and poor (excessive risk).
As e=1, the white function is:
As e=2, the white function is:
As e=3, the white function is:
As e=4, the white function is:
Utilize formula
Calculate and obtain the grey evaluation power reij that the factor of evaluation Vij corresponds to e classes, obtain the factor of evaluation Vij
For the grey evaluation weight vector rij=(r1ij, r2ij, r3ij, r4ij) of all kinds of grey classes.
Embodiment 2
Based on same inventive concept, another aspect of the present invention, as shown in figure 5, a kind of net provided in an embodiment of the present invention
Network security arrangement analysis and evaluation device hardware configuration, specifically, the network security step analysis apparatus for evaluating 40 includes at least
Processor 41, memory 42 and data/address bus 43.Data/address bus 43 is used for realization the company between processor 41 and memory 42
Letter is connected, memory 42 is used as a kind of computer-readable recording medium, can store at least one computer program, these calculating
Machine program reads, compiles and performs for processor 41, so as to fulfill corresponding process flow.In the present embodiment, memory
42 are used as a kind of computer-readable recording medium, wherein being stored with network security step analysis appraisal procedure, the program is for place
Reason device 41 performs, the step of so as to fulfill following network security step analysis appraisal procedure:
Build the security risk assessment index of one group of computer network information system that can reflect Recurison order hierarchy model, institute
It is destination layer, rule layer and indicator layer respectively to state security risk assessment index;
Determine the weight of each assessment factor Vij in the rule layer and the indicator layer, and assign in the indicator layer
Each mono- quantized value dij of the assessment factor Vij, and confidence level tune is carried out to the quantized value dij using D-S evidence theory
It is whole;
Grey class division is carried out to the factor of evaluation Vij, and each grey class is represented using white function, with reference to the amount
Change value dij, which is calculated, obtains grey evaluation weight vector rijs of the factor of evaluation Vij for all kinds of grey classes;
The grey risk formed according to the corresponding weight aij of the factor of evaluation Vij and grey evaluation weight vector rij
Evaluate weight matrix Ri and calculate the risk evaluation results Bij for obtaining the indicator layer.
According to the corresponding weight Ai of risk factors in the risk evaluation results Bij of the indicator layer and the rule layer, meter
Calculate the risk evaluation results O for obtaining the rule layer.
By the corresponding grey class of the rule layer and the indicator layer according to etc. grading row Fu give different values, utilize first-class
Level adele C describes the grey class hierarchy of various evaluations;Utilize formula:W=O × CTIt can be calculated computer network information system
Comprehensive assessment result W.
In addition, it is based on same inventive concept, the calculating of this implementation with the network security step analysis appraisal procedure of embodiment 1
Network security step analysis appraisal procedure in machine readable storage medium storing program for executing can also perform and realize other involved by embodiment 1
Network security step analysis appraisal procedure step, therefore the present embodiment repeats no more.
Embodiment 3
Another aspect of the present invention, there is provided a kind of computer-readable recording medium, the computer-readable recording medium
On be stored with network security step analysis appraisal procedure, it is real when the network security step analysis appraisal procedure is executed by processor
Now the step of following network security step analysis appraisal procedure:
Build the security risk assessment index of one group of computer network information system that can reflect Recurison order hierarchy model, institute
It is destination layer, rule layer and indicator layer respectively to state security risk assessment index;
Determine the weight of each assessment factor Vij in the rule layer and the indicator layer, and assign in the indicator layer
Each mono- quantized value dij of the assessment factor Vij, and confidence level tune is carried out to the quantized value dij using D-S evidence theory
It is whole;
Grey class division is carried out to the factor of evaluation Vij, and each grey class is represented using white function, with reference to the amount
Change value dij, which is calculated, obtains grey evaluation weight vector rijs of the factor of evaluation Vij for all kinds of grey classes;
The grey risk formed according to the corresponding weight aij of the factor of evaluation Vij and grey evaluation weight vector rij
Evaluate weight matrix Ri and calculate the risk evaluation results Bij for obtaining the indicator layer.
In addition, it is based on same inventive concept, the calculating of this implementation with the network security step analysis appraisal procedure of embodiment 1
Network security step analysis appraisal procedure in machine readable storage medium storing program for executing can also perform and realize other involved by embodiment 1
Network security step analysis appraisal procedure step, therefore the present embodiment repeats no more.
Network security step analysis appraisal procedure, device and the computer-readable recording medium of the present invention, by introducing ash
The theoretical improvement level methods of risk assessment with D-S evidence theory of color, establishes an effective Analytic Hierarchy Process Model, can be more
Objectively, risk existing for information system is comprehensively obtained, is provided decision support for information system defence., this method can be complete
Into network security risk dynamic evaluation process, the accuracy of assessment can greatly be improved, meets the actual need of network security
Ask;By in improved Hierarchy Analysis Method appliance computer network information system evaluation process, computer can be preferably found
The risk factors implied in network information system, it is comprehensive to be on the defensive and improve network operation index.
Although above with general explanation and specific embodiment, the present invention is described in detail, at this
On the basis of invention, it can be made some modifications or improvements, this will be apparent to those skilled in the art.Therefore,
These modifications or improvements without departing from theon the basis of the spirit of the present invention, belong to the scope of protection of present invention.
Claims (8)
1. a kind of network security step analysis appraisal procedure, it is characterised in that the described method comprises the following steps:
Gather assessment factor mark, weight and the risk class data of network security assessment, formed weight standard database and
Risk class database, builds the security risk assessment of one group of computer network information system that can reflect Recurison order hierarchy model
Index, the security risk assessment index are destination layer, rule layer and indicator layer respectively;
Compared according to the weight standard database and determine each assessment factor V in the rule layer and the indicator layerijPower
Weight, and assign each assessment factor V in the indicator layerijOne quantized value dij, and using D-S evidence theory to the amount
Change value dijCarry out confidence level adjustment;
According to the risk class database to the factor of evaluation VijGrey class division is carried out, and albefaction letter is utilized to each grey class
Number represents, with reference to the quantized value dijCalculate and obtain the factor of evaluation VijFor the grey evaluation weight vector r of all kinds of grey classesij;
According to the factor of evaluation VijCorresponding weight aijWith the grey evaluation weight vector rijThe grey risk assessment power of formation
Matrix RiCalculate the risk evaluation results B for obtaining the indicator layerij。
2. a kind of network security step analysis appraisal procedure according to claim 1, it is characterised in that according to the index
The risk evaluation results B of layerijWeight A corresponding with risk factors in the rule layeri, calculate the risk for obtaining the rule layer
Evaluation result O.
A kind of 3. network security step analysis appraisal procedure according to claim 2, it is characterised in that the rule layer and
The indicator layer according to the risk class database by corresponding grey class according to etc. grading row Fu give different values, utilize one
Grade adele C describes the grey class hierarchy of various evaluations;Utilize formula:W=O × CTIt can be calculated computer network information system
Comprehensive assessment result of uniting W.
4. a kind of network security step analysis appraisal procedure according to claim 1, it is characterised in that described in the basis
Weight standard database, which compares, determines each assessment factor V in the rule layer and the indicator layerijWeight specific steps
Including:
According to each assessment factor mark and history weighted data in the weight standard database by the indicator layer
Each assessment factor VijDivided rank, and each grade uses the integer representation between [1,10], according to Satty rules
It will determine that the standard degree of matrix is divided into 5 grades according to actual conditions;
Each assessment factor V in the corresponding indicator layerijQuantitative analysis is carried out, and determines the assessment factor VijProbability distribution
Value nkij (hx), the probability distribution value form a score value probability matrix;
The assessment factor V is integrated using D-S evidence theoryijProbability distribution value nkij (hx), using formula nij (h)=
N1ij (h1) × 1+n2j (h2) × 3+n3ij (h3) × 5+n4ij (h4) × 7+n5ij (h5) × 9 calculate obtain the assessment because
Plain VijSignificance level nij (h);
Calculated by formula aij=nij (h)/∑ nij (h) and obtain the factor of evaluation VijCorresponding weight aij, while by tired
Add and the corresponding weight A of risk factors in the rule layer is calculatedi。
5. a kind of network security step analysis appraisal procedure according to claim 4, it is characterised in that described in the imparting
Each assessment factor V in indicator layerijOne quantized value dij, and using D-S evidence theory to the quantized value dijCarry out credible
The step of degree adjustment, specifically includes:
History score data in the weight standard database is to the assessment factor VijRisk assessment scoring is carried out, and
Fraction levels are divided into 5 levels, and assign the assessment factor VijThe basic confidence level of the corresponding risk assessment scoring
Distribute mkij (xh);
Basic reliability distribution mkij (xh) is adjusted using D-S evidence theory, and it is whole by grey topology degree compositional rule
Close and obtain the assessment factor VijThe belief assignment m of the corresponding risk assessment scoringij(xh);
Pass through formula:dij=m1 (x1) × 1+m2 (x2) × 3+m3 (x3) × 5+m4 (x4) × 7+m5 (x5) × 9, calculates and obtains institute
State assessment factor VijCorresponding quantized value dij。
6. a kind of network security step analysis appraisal procedure according to claim 5, it is characterised in that described in the basis
Risk class database is to the factor of evaluation VijGrey class division is carried out, and each grey class is represented using white function, with reference to
The quantized value dijCalculate and obtain the factor of evaluation VijFor the grey evaluation weight vector r of all kinds of grey classesijThe step of specifically wrap
Include:
According to the factor of evaluation V of the risk class databaseijGrade scale, by the factor of evaluation VijCorresponding risk is commented
Estimate and be divided into 4 grey classes, and each grey class sequence number is represented with ei;
As e=1, the white function is:
<mrow>
<msub>
<mo>&Integral;</mo>
<mn>1</mn>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mfenced open = "{" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<mn>1</mn>
<mo>,</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>&Element;</mo>
<mo>&lsqb;</mo>
<mn>10</mn>
<mo>,</mo>
<mo>+</mo>
<mi>&infin;</mi>
<mo>)</mo>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>/</mo>
<mn>10</mn>
<mo>,</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>&Element;</mo>
<mo>&lsqb;</mo>
<mn>0</mn>
<mo>,</mo>
<mn>10</mn>
<mo>)</mo>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<mn>0</mn>
<mo>,</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>&Element;</mo>
<mrow>
<mo>(</mo>
<mo>-</mo>
<mi>&infin;</mi>
<mo>,</mo>
<mn>0</mn>
<mo>)</mo>
</mrow>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
<mo>;</mo>
</mrow>
As e=2, the white function is:
<mrow>
<msub>
<mo>&Integral;</mo>
<mn>2</mn>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mfenced open = "{" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<mfrac>
<mrow>
<mn>14</mn>
<mo>-</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
</mrow>
<mn>7</mn>
</mfrac>
<mo>,</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>&Element;</mo>
<mo>&lsqb;</mo>
<mn>7</mn>
<mo>,</mo>
<mn>14</mn>
<mo>&rsqb;</mo>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>/</mo>
<mn>7</mn>
<mo>,</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>&Element;</mo>
<mo>&lsqb;</mo>
<mn>0</mn>
<mo>,</mo>
<mn>7</mn>
<mo>)</mo>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<mn>0</mn>
<mo>,</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>&NotElement;</mo>
<mrow>
<mo>(</mo>
<mn>0</mn>
<mo>,</mo>
<mn>14</mn>
<mo>)</mo>
</mrow>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
<mo>;</mo>
</mrow>
As e=3, the white function is:
As e=4, the white function is:
<mrow>
<msub>
<mo>&Integral;</mo>
<mn>4</mn>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mfenced open = "{" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<mn>1</mn>
<mo>,</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>&Element;</mo>
<mo>&lsqb;</mo>
<mn>0</mn>
<mo>,</mo>
<mn>2</mn>
<mo>)</mo>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<mfrac>
<mrow>
<mn>4</mn>
<mo>-</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
</mrow>
<mn>2</mn>
</mfrac>
<mo>,</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>&Element;</mo>
<mo>&lsqb;</mo>
<mn>2</mn>
<mo>,</mo>
<mn>4</mn>
<mo>&rsqb;</mo>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<mn>0</mn>
<mo>,</mo>
<msub>
<mi>d</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>&NotElement;</mo>
<mrow>
<mo>(</mo>
<mn>0</mn>
<mo>,</mo>
<mn>4</mn>
<mo>)</mo>
</mrow>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
<mo>;</mo>
</mrow>
Utilize formula
Calculate and obtain the factor of evaluation VijThe grey evaluation power reij of corresponding e classes, obtains the factor of evaluation VijFor each
The grey evaluation weight vector rij=(r1ij, r2ij, r3ij, r4ij) of class ash class.
A kind of 7. network security step analysis apparatus for evaluating, it is characterised in that the network security step analysis apparatus for evaluating bag
Include processor, memory and data/address bus;
The data/address bus is used for realization the connection communication between processor and memory;
The processor is used to perform the network security step analysis appraisal procedure stored in memory, to realize following steps:
Gather assessment factor mark, weight and the risk class data of network security assessment, formed weight standard database and
Risk class database, builds the security risk assessment of one group of computer network information system that can reflect Recurison order hierarchy model
Index, the security risk assessment index are destination layer, rule layer and indicator layer respectively;
Compared according to the weight standard database and determine each assessment factor V in the rule layer and the indicator layerijPower
Weight, and assign each assessment factor V in the indicator layerijOne quantized value dij, and using D-S evidence theory to the amount
Change value dijCarry out confidence level adjustment;
According to the risk class database to the factor of evaluation VijGrey class division is carried out, and albefaction letter is utilized to each grey class
Number represents, with reference to the quantized value dijCalculate and obtain the factor of evaluation VijFor the grey evaluation weight vector r of all kinds of grey classesij;
According to the factor of evaluation VijCorresponding weight aijWith the grey evaluation weight vector rijThe grey risk assessment power of formation
Matrix RiCalculate the risk evaluation results B for obtaining the indicator layerij;
According to the risk evaluation results B of the indicator layerijWeight A corresponding with risk factors in the rule layeri, calculate and obtain
The risk evaluation results O of the rule layer;
The rule layer and the indicator layer according to the risk class database by corresponding grey class according to etc. grading row Fu give
Different values, the grey class hierarchy of various evaluations is described using a grade adele C;Utilize formula:W=O × CTIt can be calculated
To computer network information system comprehensive assessment result W.
8. a kind of computer-readable recording medium, it is characterised in that network peace is stored with the computer-readable recording medium
Holostrome time analysis and evaluation program, realizes such as claim 1- when the network security step analysis appraisal procedure is executed by processor
The step of network security step analysis appraisal procedure described in 6 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711185503.0A CN107944702A (en) | 2017-11-23 | 2017-11-23 | A kind of network security step analysis appraisal procedure, device and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711185503.0A CN107944702A (en) | 2017-11-23 | 2017-11-23 | A kind of network security step analysis appraisal procedure, device and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107944702A true CN107944702A (en) | 2018-04-20 |
Family
ID=61930163
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711185503.0A Pending CN107944702A (en) | 2017-11-23 | 2017-11-23 | A kind of network security step analysis appraisal procedure, device and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107944702A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109034580A (en) * | 2018-07-16 | 2018-12-18 | 三门核电有限公司 | A kind of information system holistic health degree appraisal procedure based on big data analysis |
CN110543997A (en) * | 2018-05-29 | 2019-12-06 | 北京国铁盛阳技术有限公司 | Method and device for quantifying equipment quality, computer equipment and storage medium |
CN112231937A (en) * | 2020-11-23 | 2021-01-15 | 中煤科工集团沈阳设计研究院有限公司 | C-F model based wheel hopper continuous process system reliability evaluation method and system |
CN112231314A (en) * | 2020-11-05 | 2021-01-15 | 深圳市丽湖软件有限公司 | Quality data evaluation method based on ETL |
CN112288593A (en) * | 2020-10-21 | 2021-01-29 | 南方电网科学研究院有限责任公司 | Evaluation data processing method, device and medium for power grid emergency system |
CN113534129A (en) * | 2021-06-29 | 2021-10-22 | 中国人民解放军93209部队 | Method and system for evaluating high-speed target detection performance of foundation broadband radar |
CN114066233A (en) * | 2021-11-15 | 2022-02-18 | 中大检测(湖南)股份有限公司 | Scene grading safety risk real-time evaluation method for subdividing index values |
CN114745293A (en) * | 2022-03-30 | 2022-07-12 | 深圳市国电科技通信有限公司 | Network communication quality evaluation method and device, electronic equipment and storage medium |
CN115982709A (en) * | 2022-09-02 | 2023-04-18 | 北京永信至诚科技股份有限公司 | Network security health state evaluation and display method based on risk data |
CN117057681A (en) * | 2023-10-12 | 2023-11-14 | 航天中认软件测评科技(北京)有限责任公司 | Software quality assessment method, device, equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101227288A (en) * | 2008-01-29 | 2008-07-23 | 四川大学 | Method for evaluating hazardness of network attack |
CN103095494A (en) * | 2012-12-31 | 2013-05-08 | 北京邮电大学 | Risk evaluation method of electric power communication network |
CN105139268A (en) * | 2015-07-14 | 2015-12-09 | 国家电网公司 | Power grid safety risk assessment method |
CN107454105A (en) * | 2017-09-15 | 2017-12-08 | 北京理工大学 | A kind of multidimensional network safety evaluation method based on AHP and grey correlation |
-
2017
- 2017-11-23 CN CN201711185503.0A patent/CN107944702A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101227288A (en) * | 2008-01-29 | 2008-07-23 | 四川大学 | Method for evaluating hazardness of network attack |
CN103095494A (en) * | 2012-12-31 | 2013-05-08 | 北京邮电大学 | Risk evaluation method of electric power communication network |
CN105139268A (en) * | 2015-07-14 | 2015-12-09 | 国家电网公司 | Power grid safety risk assessment method |
CN107454105A (en) * | 2017-09-15 | 2017-12-08 | 北京理工大学 | A kind of multidimensional network safety evaluation method based on AHP and grey correlation |
Non-Patent Citations (1)
Title |
---|
谢文: "信息安全风险评估方法研究与应用", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110543997A (en) * | 2018-05-29 | 2019-12-06 | 北京国铁盛阳技术有限公司 | Method and device for quantifying equipment quality, computer equipment and storage medium |
CN110543997B (en) * | 2018-05-29 | 2020-12-29 | 北京国铁盛阳技术有限公司 | Method and device for quantifying equipment quality, computer equipment and storage medium |
CN109034580A (en) * | 2018-07-16 | 2018-12-18 | 三门核电有限公司 | A kind of information system holistic health degree appraisal procedure based on big data analysis |
CN109034580B (en) * | 2018-07-16 | 2020-09-11 | 三门核电有限公司 | Information system overall health degree evaluation method based on big data analysis |
CN112288593A (en) * | 2020-10-21 | 2021-01-29 | 南方电网科学研究院有限责任公司 | Evaluation data processing method, device and medium for power grid emergency system |
CN112231314A (en) * | 2020-11-05 | 2021-01-15 | 深圳市丽湖软件有限公司 | Quality data evaluation method based on ETL |
CN112231937A (en) * | 2020-11-23 | 2021-01-15 | 中煤科工集团沈阳设计研究院有限公司 | C-F model based wheel hopper continuous process system reliability evaluation method and system |
CN113534129A (en) * | 2021-06-29 | 2021-10-22 | 中国人民解放军93209部队 | Method and system for evaluating high-speed target detection performance of foundation broadband radar |
CN114066233A (en) * | 2021-11-15 | 2022-02-18 | 中大检测(湖南)股份有限公司 | Scene grading safety risk real-time evaluation method for subdividing index values |
CN114745293A (en) * | 2022-03-30 | 2022-07-12 | 深圳市国电科技通信有限公司 | Network communication quality evaluation method and device, electronic equipment and storage medium |
CN114745293B (en) * | 2022-03-30 | 2023-11-17 | 深圳市国电科技通信有限公司 | Network communication quality evaluation method and device, electronic equipment and storage medium |
CN115982709A (en) * | 2022-09-02 | 2023-04-18 | 北京永信至诚科技股份有限公司 | Network security health state evaluation and display method based on risk data |
CN117057681A (en) * | 2023-10-12 | 2023-11-14 | 航天中认软件测评科技(北京)有限责任公司 | Software quality assessment method, device, equipment and storage medium |
CN117057681B (en) * | 2023-10-12 | 2024-01-16 | 航天中认软件测评科技(北京)有限责任公司 | Software quality assessment method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107944702A (en) | A kind of network security step analysis appraisal procedure, device and computer-readable recording medium | |
CN108683664B (en) | A kind of network risk analysis and optimal active defense method based on multi-level betting model | |
CN110138627B (en) | A kind of edge side terminal security access strategy selection method based on security risk quantization | |
CN108108875A (en) | A kind of distribution Running State fuzzy synthetic appraisement method based on cooperative game method and trapezoidal cloud model | |
CN107623697A (en) | A kind of network security situation evaluating method based on attacking and defending Stochastic Game Model | |
CN111611524B (en) | Gas risk assessment and safety supervision resource matching method and device | |
CN111787011B (en) | Intelligent analysis and early warning system, method and storage medium for security threat of information system | |
CN104320271B (en) | A kind of network equipment safety evaluation method and device | |
Zeng et al. | A value and ambiguity-based ranking method of trapezoidal intuitionistic fuzzy numbers and application to decision making | |
CN107454105A (en) | A kind of multidimensional network safety evaluation method based on AHP and grey correlation | |
CN108494787A (en) | A kind of network risk assessment method based on asset association figure | |
CN106713233A (en) | Method for judging and protecting network security state | |
CN108197848A (en) | A kind of energy quality comprehensive assessment method and device based on intuitionistic fuzzy theory | |
CN109858134A (en) | The method of the more change system architectural model buildings of the auxiliary of big data driving | |
WO2022242181A1 (en) | Method and apparatus for evaluating health degree indexes of layers of smart substation | |
Bettinger et al. | Combinatorial optimization of elk habitat effectiveness and timber harvest volume | |
CN105306486A (en) | Markov process-based drug test cloud computing security state evaluation method | |
CN115640305B (en) | Fair and reliable federal learning method based on blockchain | |
Wu et al. | Information systems security risk assessment on improved fuzzy AHP | |
CN113642669B (en) | Feature analysis-based fraud prevention detection method, device, equipment and storage medium | |
CN115550077A (en) | Real-time online detection danger source data and trigger automatic defense method | |
Luo et al. | Information security risk assessment based on two stages decision model with grey synthetic measure | |
CN114971180A (en) | Network system risk assessment method and device, computer equipment and storage medium | |
Wang et al. | New approach for information security evaluation and management of IT systems in educational institutions | |
CN110298058A (en) | A kind of power grid supervision index key element extracting method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180420 |