CN107944702A - A kind of network security step analysis appraisal procedure, device and computer-readable recording medium - Google Patents

A kind of network security step analysis appraisal procedure, device and computer-readable recording medium Download PDF

Info

Publication number
CN107944702A
CN107944702A CN201711185503.0A CN201711185503A CN107944702A CN 107944702 A CN107944702 A CN 107944702A CN 201711185503 A CN201711185503 A CN 201711185503A CN 107944702 A CN107944702 A CN 107944702A
Authority
CN
China
Prior art keywords
mrow
msub
factor
evaluation
grey
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711185503.0A
Other languages
Chinese (zh)
Inventor
刘文龙
李欣
尚晓丽
孙珊珊
马春华
刘子逸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suihua University
Original Assignee
Suihua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suihua University filed Critical Suihua University
Priority to CN201711185503.0A priority Critical patent/CN107944702A/en
Publication of CN107944702A publication Critical patent/CN107944702A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The invention discloses a kind of network security step analysis appraisal procedure, device and computer-readable recording medium, this method to comprise the following steps:The security risk assessment index of one group of computer network information system that can reflect Recurison order hierarchy model is built, security risk assessment index is destination layer, rule layer and indicator layer respectively;The weight for determining each assessment factor Vij in rule layer and indicator layer is compared according to weight standard database, and assigns each mono- quantized value dij of assessment factor Vij in indicator layer, and confidence level adjustment is carried out to quantized value dij using D S evidence theories;Grey class division is carried out to factor of evaluation Vij according to risk class database, and each grey class is represented using white function, is calculated with reference to quantized value dij and obtains grey evaluation weight vector rijs of the factor of evaluation Vij for all kinds of grey classes;The grey risk assessment weight matrix Ri formed according to factor of evaluation Vij corresponding weight aij and grey evaluation weight vector rij calculates the risk evaluation results Bij for obtaining indicator layer.

Description

A kind of network security step analysis appraisal procedure, device and computer-readable storage Medium
Technical field
The present invention relates to computer network security technology field, and in particular to a kind of network security step analysis assessment side Method, device and computer-readable recording medium.
Background technology
As computer technology, the quick improvement of Internet technology and development, social informatization degree are persistently lifted, formed The information-intensive society of global integration, therefore cause the people to increase sharply the degree of dependence of computer network, computer network The importance of information security is also increasingly valued by the people.Computer network own routine work, life and through in people Become one of important instrument during habit, in view of the opening of computer network, sharing and convenience, computerized information net Network to work for people, living and studying brings great convenience while, also for society bring larger threat, especially It is that the use to computer network information is brought with new period computer network hacker, wooden horse, virus and artificial destruction etc. Great security threat.
In face of the information security of computer network demand of rapid growth, only from passive defense technique etc. without Method meets the requirement of network security, and can not fundamentally solve network security missile defense, and the safety of information system needs Comprehensively to carry out prevention and control.Therefore, it is current can effectively to analyze network information system for information security of computer network risk assessment With following risk development trend, threat and its influence degree that these risks are brought to information security of computer network are assessed, It is convenient preferably to formulate Prevention-Security strategy, the operational support of safety is provided for the calculatingization network information.At present, computer network Evaluation of Information System Security Risk mainly includes qualitative analysis, quantitative analysis and hybrid analysis Three models, especially level point Analysis method, it can effectively assess safety existing for computer network information system as a kind of Quantitative Risk Assessment method Loophole or risk problem, achieve preferable effect, in step analysis implementation process, although Hierarchy Analysis Method can The objectivity of its risk assessment is effectively improved, but since information security of computer network influence factor is more, causes scale work Measure very big, therefore be very easy to cause scale to judge to occur chaotic, it is zero or the situation of negative value to ignore scale value, flower Take the uniformity that more energy discusses judgment matrix, it is impossible to sufficiently consider the reasonability of judgment matrix.
The content of the invention
It is an object of the invention to provide a kind of network security step analysis appraisal procedure, device and computer-readable storage Medium, it is very big to solve existing Hierarchy Analysis Method scale workload, easily cause scale to judge confusion occurs, it is impossible to It is zero or the problem of the situation of negative value to take into full account scale value.
To solve the above-mentioned problems, by analyzing existing method for evaluating information system risk, fixation analysis side is summarized Relation and advantage and disadvantage between method, method for qualitative analysis, it is proposed that a kind of improvement layer based on gray theory and D-S evidence theory Secondary risk analysis method, establishes an effective Analytic Hierarchy Process Model, more objectively, comprehensively can obtain information system and deposit Risk, for information system defence provide decision support.
Specifically, the present invention provides a kind of network security step analysis appraisal procedure, this method comprises the following steps:
Assessment factor mark, weight and the risk class data of network security assessment are gathered, form weight normal data Storehouse and risk class database, build the security risk of one group of computer network information system that can reflect Recurison order hierarchy model Evaluation index, the security risk assessment index are destination layer, rule layer and indicator layer respectively;
Compared according to the weight standard database and determine each assessment factor Vij in the rule layer and the indicator layer Weight, and assign each mono- quantized value dij of assessment factor Vij in the indicator layer, and using D-S evidence theory to institute State quantized value dij and carry out confidence level adjustment;
Grey class division is carried out to the factor of evaluation Vij according to the risk class database, and each grey class is utilized White function represents, is calculated with reference to the quantized value dij and obtains grey evaluation power of the factor of evaluation Vij for all kinds of grey classes Vectorial rij;
The grey risk formed according to the corresponding weight aij of the factor of evaluation Vij and grey evaluation weight vector rij Evaluate weight matrix Ri and calculate the risk evaluation results Bij for obtaining the indicator layer.
Further, it is corresponding according to risk factors in the risk evaluation results Bij of the indicator layer and the rule layer Weight Ai, calculates the risk evaluation results O for obtaining the rule layer.
Further, the rule layer and the indicator layer according to the risk class database by corresponding grey class according to Different values is given etc. grading row Fu, the grey class hierarchy of various evaluations is described using a grade adele C;Utilize formula:W=O ×CTIt can be calculated computer network information system comprehensive assessment result W.
It is apparent that if W result of calculations are bigger, represent that computer network information system security risk is higher.
Further, described compared according to the weight standard database is determined in the rule layer and the indicator layer often The specific steps of the weight of one assessment factor Vij include:
According to each assessment factor mark in the weight standard database and history weighted data by the index Each assessment factor Vij divided ranks in layer, and each grade uses the integer representation between [1,10], according to Satty rules will determine that the standard degree of matrix is divided into 5 grades according to actual conditions;
Each assessment factor Vij carries out quantitative analysis in the corresponding indicator layer, and determines that the assessment factor Vij's is general Rate Distribution Value nkij (hx), the probability distribution value form a score value probability matrix;
The probability distribution value nkij (hx) of the assessment factor Vij is integrated using D-S evidence theory, utilizes formula nij (h)=n1ij (h1) × 1+n2j (h2) × 3+n3ij (h3) × 5+n4ij (h4) × 7+n5ij (h5) × 9, which is calculated, obtains institute's commentary Estimate the significance level nij (h) of factor Vij;
Calculated by formula aij=nij (h)/∑ nij (h) and obtain the corresponding weight aij of the factor of evaluation Vij, at the same time The corresponding weight Ai of risk factors in the rule layer is obtained by accumulation calculating.
Further, it is described to assign each mono- quantized value dij of assessment factor Vij in the indicator layer, and utilize D-S The step of evidence theory carries out confidence level adjustment to the quantized value dij specifically includes:
History score data in the weight standard database carries out risk assessment to the assessment factor Vij and comments Point, and fraction levels are divided into 5 levels, and assign the assessment factor Vij and correspond to the basic of the risk assessment scoring Belief assignment mkij (xh);
Basic reliability distribution mkij (xh) is adjusted using D-S evidence theory, and passes through grey topology degree synthetic method Then integrate and obtain the belief assignment mij (xh) that the assessment factor Vij corresponds to the risk assessment scoring;
Pass through formula:Dij=m1 (x1) × 1+m2 (x2) × 3+m3 (x3) × 5+m4 (x4) × 7+m5 (x5) × 9, calculates Obtain the corresponding quantized value dij of the assessment factor Vij.
Further, it is described to carry out grey class division to the factor of evaluation Vij according to the risk class database and right Each ash class is represented using white function, is calculated with reference to the quantized value dij and is obtained the factor of evaluation Vij for all kinds of grey classes Grey evaluation weight vector rij the step of specifically include:
It is according to the grade scale of the factor of evaluation Vij of the risk class database, the factor of evaluation Vij is corresponding Risk assessment is divided into 4 grey classes, and each grey class sequence number is represented with ei;4 grey classes are outstanding (safety), good (one As safety), it is medium (risky) and poor (excessive risk).
As e=1, the white function is:
As e=2, the white function is:
As e=3, the white function is:
As e=4, the white function is:
Utilize formula
Calculate and obtain the grey evaluation power reij that the factor of evaluation Vij corresponds to e classes, obtain the factor of evaluation Vij For the grey evaluation weight vector rij=(r1ij, r2ij, r3ij, r4ij) of all kinds of grey classes.
Based on same inventive concept, another aspect of the present invention, there is provided a kind of network security step analysis apparatus for evaluating, The network security step analysis apparatus for evaluating includes processor, memory and data/address bus;
The data/address bus is used for realization the connection communication between processor and memory;
The processor is used to perform the network security step analysis appraisal procedure stored in memory, to realize following step Suddenly:
Assessment factor mark, weight and the risk class data of network security assessment are gathered, form weight normal data Storehouse and risk class database, build the security risk of one group of computer network information system that can reflect Recurison order hierarchy model Evaluation index, the security risk assessment index are destination layer, rule layer and indicator layer respectively;
Compared according to the weight standard database and determine each assessment factor Vij in the rule layer and the indicator layer Weight, and assign each mono- quantized value dij of assessment factor Vij in the indicator layer, and using D-S evidence theory to institute State quantized value dij and carry out confidence level adjustment;
Grey class division is carried out to the factor of evaluation Vij according to the risk class database, and each grey class is utilized White function represents, is calculated with reference to the quantized value dij and obtains grey evaluation power of the factor of evaluation Vij for all kinds of grey classes Vectorial rij;
The grey risk formed according to the corresponding weight aij of the factor of evaluation Vij and grey evaluation weight vector rij Evaluate weight matrix Ri and calculate the risk evaluation results Bij for obtaining the indicator layer;
According to the corresponding weight Ai of risk factors in the risk evaluation results Bij of the indicator layer and the rule layer, meter Calculate the risk evaluation results O for obtaining the rule layer;
The rule layer and the indicator layer carry out corresponding grey class according to grade according to the risk class database Fu gives different values, and the grey class hierarchy of various evaluations is described using a grade adele C;Utilize formula:W=O × CTCalculate It can obtain computer network information system comprehensive assessment result W.
Based on same inventive concept, another aspect of the present invention, there is provided a kind of computer-readable recording medium, the meter Network security step analysis appraisal procedure, the network security step analysis appraisal procedure are stored with calculation machine readable storage medium storing program for executing The step of above-mentioned network security step analysis appraisal procedure is realized when being executed by processor.
The beneficial effect of technical solution of the present invention:
Network security step analysis appraisal procedure, device and the computer-readable recording medium of the present invention, by introducing ash The theoretical improvement level methods of risk assessment with D-S evidence theory of color, establishes an effective Analytic Hierarchy Process Model, can be more Objectively, risk existing for information system is comprehensively obtained, is provided decision support for information system defence., this method can be complete Into network security risk dynamic evaluation process, the accuracy of assessment can greatly be improved, meets the actual need of network security Ask;By in improved Hierarchy Analysis Method appliance computer network information system evaluation process, computer can be preferably found The risk factors implied in network information system, it is comprehensive to be on the defensive and improve network operation index.
Brief description of the drawings
Fig. 1 the present embodiments relate to computer network information system security risk assessment factor index system.
A kind of Fig. 2 network security step analysis appraisal procedure FB(flow block)s provided in an embodiment of the present invention.
Provided in an embodiment of the present invention compared according to the weight standard database of Fig. 3 determines the rule layer and the finger Mark the specific steps FB(flow block) of the weight of each assessment factor Vij in layer.
Fig. 4 is provided in an embodiment of the present invention to assign each mono- quantized value dij of assessment factor Vij in the indicator layer, And the step idiographic flow block diagram of confidence level adjustment is carried out to the quantized value dij using D-S evidence theory.
A kind of Fig. 5 network security step analysis apparatus for evaluating structure diagrams provided in an embodiment of the present invention.
Embodiment
Following embodiments are used to illustrate the present invention, but are not limited to the scope of the present invention.
Embodiment 1
As shown in Fig. 2, the present invention provides a kind of network security step analysis appraisal procedure, this method includes following step Suddenly:
S101, assessment factor mark, weight and the risk class data for gathering network security assessment, form weight standard Database and risk class database, build the safety of one group of computer network information system that can reflect Recurison order hierarchy model Risk assessment index, the security risk assessment index are destination layer, rule layer and indicator layer respectively;
As shown in Figure 1, computer network information system security risk is destination layer, rule layer include information system assets, Information system access controls and information system communication and operation;Indicator layer include influence intangible asset, influence physical assets, its His assets;Network users management, user's Access Management Access, application access management, system are accessed to be monitored with application;Malware is prevented Control, media handling and safety, operation sequence and responsibility, network management, information exchange etc. with software and hardware.
S102, compared according to the weight standard database determine in the rule layer and the indicator layer each assessment because The weight of plain Vij, and each mono- quantized value dij of assessment factor Vij in the indicator layer are assigned, and utilize D-S evidences reason Confidence level adjustment is carried out by the quantized value dij;
S103, carry out the factor of evaluation Vij according to the risk class database grey class division, and to each grey class Represented using white function, calculate the acquisition factor of evaluation Vij with reference to the quantized value dij comments for the grey of all kinds of grey classes Valency weight vector rij;
S104, the ash formed according to the corresponding weight aij of the factor of evaluation Vij and grey evaluation weight vector rij Color risk assessment weight matrix Ri calculates the risk evaluation results Bij for obtaining the indicator layer.
Wherein, according to the corresponding weight of risk factors in the risk evaluation results Bij of the indicator layer and the rule layer Ai, calculates the risk evaluation results O for obtaining the rule layer.
Wherein, the rule layer and the indicator layer according to the risk class database by corresponding grey class according to grade Different values is given into row Fu, the grey class hierarchy of various evaluations is described using a grade adele C;Utilize formula:W=O × CT It can be calculated computer network information system comprehensive assessment result W.
It is apparent that if W result of calculations are bigger, represent that computer network information system security risk is higher.
As shown in figure 3, described compared according to the weight standard database is determined in the rule layer and the indicator layer The specific steps of the weight of each assessment factor Vij include:
S201, according to each assessment factor mark in the weight standard database and history weighted data will described in Each assessment factor Vij divided ranks in indicator layer, and each grade uses the integer representation between [1,10], according to Satty rules will determine that the standard degree of matrix is divided into 5 grades according to actual conditions;
Shown in table 1 specific as follows;
Table 1
The standard degree fraction levels of judgment matrix Fraction index Fuzzy level Fraction value
It is general important 0,2 1
It is somewhat important 2,4 3
It is obvious important 4,6 5
It is strong important 6,8 7
It is extremely important 8,10 9
Each assessment factor Vij carries out quantitative analysis in S202, the corresponding indicator layer, and determines the assessment factor The probability distribution value nkij (hx) of Vij, the probability distribution value form a score value probability matrix;
S203, the probability distribution value nkij (hx) using the D-S evidence theory integration assessment factor Vij, utilize public affairs Formula nij (h)=n1ij (h1) × 1+n2j (h2) × 3+n3ij (h3) × 5+n4ij (h4) × 7+n5ij (h5) × 9, which is calculated, to be obtained The significance level nij (h) of the assessment factor Vij;
S204, calculate the corresponding weights of the acquisition factor of evaluation Vij by formula aij=nij (h)/∑ nij (h) Aij, while the corresponding weight Ai of risk factors in the rule layer is obtained by accumulation calculating.
It is specifically, as shown in table 2 below,
Table 2
As shown in figure 4, described assign each mono- quantized value dij of assessment factor Vij in the indicator layer, and utilize D- The step of S evidence theories carry out confidence level adjustment to the quantized value dij specifically includes:
S301, the history score data in the weight standard database carry out risk to the assessment factor Vij Assessment scoring, and fraction levels are divided into 5 levels, and assign the assessment factor Vij and correspond to the risk assessment scoring Basic reliability distribution mkij (xh);
Specifically, it is as shown in table 3 below:
Table 3
Risk assessment grade Fraction index Fuzzy level Fractional value
Low-risk 0,2 1
Compared with low-risk 2,4 3
Medium risk 4,6 5
High risk 6,8 7
Excessive risk 8,10 9
S302, using D-S evidence theory be adjusted basic reliability distribution mkij (xh), and is closed by grey topology degree Integrated into rule and obtain the belief assignment mij (xh) that the assessment factor Vij corresponds to the risk assessment scoring;
S303, pass through formula:Dij=m1 (x1) × 1+m2 (x2) × 3+m3 (x3) × 5+m4 (x4) × 7+m5 (x5) × 9, Calculate and obtain the corresponding quantized value dij of the assessment factor Vij.
Wherein, grey class division is carried out to the factor of evaluation Vij according to the risk class database, and to each grey class Represented using white function, calculate the acquisition factor of evaluation Vij with reference to the quantized value dij comments for the grey of all kinds of grey classes The step of valency weight vector rij, specifically includes:
According to the grade scale of the factor of evaluation Vij of the risk class database, by Vij pairs of the factor of evaluation The risk assessment answered is divided into 4 grey classes, and each grey class sequence number is represented with ei;4 grey classes are outstanding (safety), well (Generally Recognized as safe), medium (risky) and poor (excessive risk).
As e=1, the white function is:
As e=2, the white function is:
As e=3, the white function is:
As e=4, the white function is:
Utilize formula
Calculate and obtain the grey evaluation power reij that the factor of evaluation Vij corresponds to e classes, obtain the factor of evaluation Vij For the grey evaluation weight vector rij=(r1ij, r2ij, r3ij, r4ij) of all kinds of grey classes.
Embodiment 2
Based on same inventive concept, another aspect of the present invention, as shown in figure 5, a kind of net provided in an embodiment of the present invention Network security arrangement analysis and evaluation device hardware configuration, specifically, the network security step analysis apparatus for evaluating 40 includes at least Processor 41, memory 42 and data/address bus 43.Data/address bus 43 is used for realization the company between processor 41 and memory 42 Letter is connected, memory 42 is used as a kind of computer-readable recording medium, can store at least one computer program, these calculating Machine program reads, compiles and performs for processor 41, so as to fulfill corresponding process flow.In the present embodiment, memory 42 are used as a kind of computer-readable recording medium, wherein being stored with network security step analysis appraisal procedure, the program is for place Reason device 41 performs, the step of so as to fulfill following network security step analysis appraisal procedure:
Build the security risk assessment index of one group of computer network information system that can reflect Recurison order hierarchy model, institute It is destination layer, rule layer and indicator layer respectively to state security risk assessment index;
Determine the weight of each assessment factor Vij in the rule layer and the indicator layer, and assign in the indicator layer Each mono- quantized value dij of the assessment factor Vij, and confidence level tune is carried out to the quantized value dij using D-S evidence theory It is whole;
Grey class division is carried out to the factor of evaluation Vij, and each grey class is represented using white function, with reference to the amount Change value dij, which is calculated, obtains grey evaluation weight vector rijs of the factor of evaluation Vij for all kinds of grey classes;
The grey risk formed according to the corresponding weight aij of the factor of evaluation Vij and grey evaluation weight vector rij Evaluate weight matrix Ri and calculate the risk evaluation results Bij for obtaining the indicator layer.
According to the corresponding weight Ai of risk factors in the risk evaluation results Bij of the indicator layer and the rule layer, meter Calculate the risk evaluation results O for obtaining the rule layer.
By the corresponding grey class of the rule layer and the indicator layer according to etc. grading row Fu give different values, utilize first-class Level adele C describes the grey class hierarchy of various evaluations;Utilize formula:W=O × CTIt can be calculated computer network information system Comprehensive assessment result W.
In addition, it is based on same inventive concept, the calculating of this implementation with the network security step analysis appraisal procedure of embodiment 1 Network security step analysis appraisal procedure in machine readable storage medium storing program for executing can also perform and realize other involved by embodiment 1 Network security step analysis appraisal procedure step, therefore the present embodiment repeats no more.
Embodiment 3
Another aspect of the present invention, there is provided a kind of computer-readable recording medium, the computer-readable recording medium On be stored with network security step analysis appraisal procedure, it is real when the network security step analysis appraisal procedure is executed by processor Now the step of following network security step analysis appraisal procedure:
Build the security risk assessment index of one group of computer network information system that can reflect Recurison order hierarchy model, institute It is destination layer, rule layer and indicator layer respectively to state security risk assessment index;
Determine the weight of each assessment factor Vij in the rule layer and the indicator layer, and assign in the indicator layer Each mono- quantized value dij of the assessment factor Vij, and confidence level tune is carried out to the quantized value dij using D-S evidence theory It is whole;
Grey class division is carried out to the factor of evaluation Vij, and each grey class is represented using white function, with reference to the amount Change value dij, which is calculated, obtains grey evaluation weight vector rijs of the factor of evaluation Vij for all kinds of grey classes;
The grey risk formed according to the corresponding weight aij of the factor of evaluation Vij and grey evaluation weight vector rij Evaluate weight matrix Ri and calculate the risk evaluation results Bij for obtaining the indicator layer.
In addition, it is based on same inventive concept, the calculating of this implementation with the network security step analysis appraisal procedure of embodiment 1 Network security step analysis appraisal procedure in machine readable storage medium storing program for executing can also perform and realize other involved by embodiment 1 Network security step analysis appraisal procedure step, therefore the present embodiment repeats no more.
Network security step analysis appraisal procedure, device and the computer-readable recording medium of the present invention, by introducing ash The theoretical improvement level methods of risk assessment with D-S evidence theory of color, establishes an effective Analytic Hierarchy Process Model, can be more Objectively, risk existing for information system is comprehensively obtained, is provided decision support for information system defence., this method can be complete Into network security risk dynamic evaluation process, the accuracy of assessment can greatly be improved, meets the actual need of network security Ask;By in improved Hierarchy Analysis Method appliance computer network information system evaluation process, computer can be preferably found The risk factors implied in network information system, it is comprehensive to be on the defensive and improve network operation index.
Although above with general explanation and specific embodiment, the present invention is described in detail, at this On the basis of invention, it can be made some modifications or improvements, this will be apparent to those skilled in the art.Therefore, These modifications or improvements without departing from theon the basis of the spirit of the present invention, belong to the scope of protection of present invention.

Claims (8)

1. a kind of network security step analysis appraisal procedure, it is characterised in that the described method comprises the following steps:
Gather assessment factor mark, weight and the risk class data of network security assessment, formed weight standard database and Risk class database, builds the security risk assessment of one group of computer network information system that can reflect Recurison order hierarchy model Index, the security risk assessment index are destination layer, rule layer and indicator layer respectively;
Compared according to the weight standard database and determine each assessment factor V in the rule layer and the indicator layerijPower Weight, and assign each assessment factor V in the indicator layerijOne quantized value dij, and using D-S evidence theory to the amount Change value dijCarry out confidence level adjustment;
According to the risk class database to the factor of evaluation VijGrey class division is carried out, and albefaction letter is utilized to each grey class Number represents, with reference to the quantized value dijCalculate and obtain the factor of evaluation VijFor the grey evaluation weight vector r of all kinds of grey classesij
According to the factor of evaluation VijCorresponding weight aijWith the grey evaluation weight vector rijThe grey risk assessment power of formation Matrix RiCalculate the risk evaluation results B for obtaining the indicator layerij
2. a kind of network security step analysis appraisal procedure according to claim 1, it is characterised in that according to the index The risk evaluation results B of layerijWeight A corresponding with risk factors in the rule layeri, calculate the risk for obtaining the rule layer Evaluation result O.
A kind of 3. network security step analysis appraisal procedure according to claim 2, it is characterised in that the rule layer and The indicator layer according to the risk class database by corresponding grey class according to etc. grading row Fu give different values, utilize one Grade adele C describes the grey class hierarchy of various evaluations;Utilize formula:W=O × CTIt can be calculated computer network information system Comprehensive assessment result of uniting W.
4. a kind of network security step analysis appraisal procedure according to claim 1, it is characterised in that described in the basis Weight standard database, which compares, determines each assessment factor V in the rule layer and the indicator layerijWeight specific steps Including:
According to each assessment factor mark and history weighted data in the weight standard database by the indicator layer Each assessment factor VijDivided rank, and each grade uses the integer representation between [1,10], according to Satty rules It will determine that the standard degree of matrix is divided into 5 grades according to actual conditions;
Each assessment factor V in the corresponding indicator layerijQuantitative analysis is carried out, and determines the assessment factor VijProbability distribution Value nkij (hx), the probability distribution value form a score value probability matrix;
The assessment factor V is integrated using D-S evidence theoryijProbability distribution value nkij (hx), using formula nij (h)= N1ij (h1) × 1+n2j (h2) × 3+n3ij (h3) × 5+n4ij (h4) × 7+n5ij (h5) × 9 calculate obtain the assessment because Plain VijSignificance level nij (h);
Calculated by formula aij=nij (h)/∑ nij (h) and obtain the factor of evaluation VijCorresponding weight aij, while by tired Add and the corresponding weight A of risk factors in the rule layer is calculatedi
5. a kind of network security step analysis appraisal procedure according to claim 4, it is characterised in that described in the imparting Each assessment factor V in indicator layerijOne quantized value dij, and using D-S evidence theory to the quantized value dijCarry out credible The step of degree adjustment, specifically includes:
History score data in the weight standard database is to the assessment factor VijRisk assessment scoring is carried out, and Fraction levels are divided into 5 levels, and assign the assessment factor VijThe basic confidence level of the corresponding risk assessment scoring Distribute mkij (xh);
Basic reliability distribution mkij (xh) is adjusted using D-S evidence theory, and it is whole by grey topology degree compositional rule Close and obtain the assessment factor VijThe belief assignment m of the corresponding risk assessment scoringij(xh);
Pass through formula:dij=m1 (x1) × 1+m2 (x2) × 3+m3 (x3) × 5+m4 (x4) × 7+m5 (x5) × 9, calculates and obtains institute State assessment factor VijCorresponding quantized value dij
6. a kind of network security step analysis appraisal procedure according to claim 5, it is characterised in that described in the basis Risk class database is to the factor of evaluation VijGrey class division is carried out, and each grey class is represented using white function, with reference to The quantized value dijCalculate and obtain the factor of evaluation VijFor the grey evaluation weight vector r of all kinds of grey classesijThe step of specifically wrap Include:
According to the factor of evaluation V of the risk class databaseijGrade scale, by the factor of evaluation VijCorresponding risk is commented Estimate and be divided into 4 grey classes, and each grey class sequence number is represented with ei;
As e=1, the white function is:
<mrow> <msub> <mo>&amp;Integral;</mo> <mn>1</mn> </msub> <mrow> <mo>(</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>)</mo> </mrow> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <mn>1</mn> <mo>,</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>&amp;Element;</mo> <mo>&amp;lsqb;</mo> <mn>10</mn> <mo>,</mo> <mo>+</mo> <mi>&amp;infin;</mi> <mo>)</mo> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>/</mo> <mn>10</mn> <mo>,</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>&amp;Element;</mo> <mo>&amp;lsqb;</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>)</mo> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mn>0</mn> <mo>,</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>&amp;Element;</mo> <mrow> <mo>(</mo> <mo>-</mo> <mi>&amp;infin;</mi> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>;</mo> </mrow>
As e=2, the white function is:
<mrow> <msub> <mo>&amp;Integral;</mo> <mn>2</mn> </msub> <mrow> <mo>(</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>)</mo> </mrow> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <mfrac> <mrow> <mn>14</mn> <mo>-</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> </mrow> <mn>7</mn> </mfrac> <mo>,</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>&amp;Element;</mo> <mo>&amp;lsqb;</mo> <mn>7</mn> <mo>,</mo> <mn>14</mn> <mo>&amp;rsqb;</mo> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>/</mo> <mn>7</mn> <mo>,</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>&amp;Element;</mo> <mo>&amp;lsqb;</mo> <mn>0</mn> <mo>,</mo> <mn>7</mn> <mo>)</mo> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mn>0</mn> <mo>,</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>&amp;NotElement;</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>14</mn> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>;</mo> </mrow>
As e=3, the white function is:
As e=4, the white function is:
<mrow> <msub> <mo>&amp;Integral;</mo> <mn>4</mn> </msub> <mrow> <mo>(</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>)</mo> </mrow> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <mn>1</mn> <mo>,</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>&amp;Element;</mo> <mo>&amp;lsqb;</mo> <mn>0</mn> <mo>,</mo> <mn>2</mn> <mo>)</mo> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mfrac> <mrow> <mn>4</mn> <mo>-</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> </mrow> <mn>2</mn> </mfrac> <mo>,</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>&amp;Element;</mo> <mo>&amp;lsqb;</mo> <mn>2</mn> <mo>,</mo> <mn>4</mn> <mo>&amp;rsqb;</mo> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mn>0</mn> <mo>,</mo> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>&amp;NotElement;</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>4</mn> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>;</mo> </mrow>
Utilize formula
Calculate and obtain the factor of evaluation VijThe grey evaluation power reij of corresponding e classes, obtains the factor of evaluation VijFor each The grey evaluation weight vector rij=(r1ij, r2ij, r3ij, r4ij) of class ash class.
A kind of 7. network security step analysis apparatus for evaluating, it is characterised in that the network security step analysis apparatus for evaluating bag Include processor, memory and data/address bus;
The data/address bus is used for realization the connection communication between processor and memory;
The processor is used to perform the network security step analysis appraisal procedure stored in memory, to realize following steps:
Gather assessment factor mark, weight and the risk class data of network security assessment, formed weight standard database and Risk class database, builds the security risk assessment of one group of computer network information system that can reflect Recurison order hierarchy model Index, the security risk assessment index are destination layer, rule layer and indicator layer respectively;
Compared according to the weight standard database and determine each assessment factor V in the rule layer and the indicator layerijPower Weight, and assign each assessment factor V in the indicator layerijOne quantized value dij, and using D-S evidence theory to the amount Change value dijCarry out confidence level adjustment;
According to the risk class database to the factor of evaluation VijGrey class division is carried out, and albefaction letter is utilized to each grey class Number represents, with reference to the quantized value dijCalculate and obtain the factor of evaluation VijFor the grey evaluation weight vector r of all kinds of grey classesij
According to the factor of evaluation VijCorresponding weight aijWith the grey evaluation weight vector rijThe grey risk assessment power of formation Matrix RiCalculate the risk evaluation results B for obtaining the indicator layerij
According to the risk evaluation results B of the indicator layerijWeight A corresponding with risk factors in the rule layeri, calculate and obtain The risk evaluation results O of the rule layer;
The rule layer and the indicator layer according to the risk class database by corresponding grey class according to etc. grading row Fu give Different values, the grey class hierarchy of various evaluations is described using a grade adele C;Utilize formula:W=O × CTIt can be calculated To computer network information system comprehensive assessment result W.
8. a kind of computer-readable recording medium, it is characterised in that network peace is stored with the computer-readable recording medium Holostrome time analysis and evaluation program, realizes such as claim 1- when the network security step analysis appraisal procedure is executed by processor The step of network security step analysis appraisal procedure described in 6 any one.
CN201711185503.0A 2017-11-23 2017-11-23 A kind of network security step analysis appraisal procedure, device and computer-readable recording medium Pending CN107944702A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711185503.0A CN107944702A (en) 2017-11-23 2017-11-23 A kind of network security step analysis appraisal procedure, device and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711185503.0A CN107944702A (en) 2017-11-23 2017-11-23 A kind of network security step analysis appraisal procedure, device and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107944702A true CN107944702A (en) 2018-04-20

Family

ID=61930163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711185503.0A Pending CN107944702A (en) 2017-11-23 2017-11-23 A kind of network security step analysis appraisal procedure, device and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107944702A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109034580A (en) * 2018-07-16 2018-12-18 三门核电有限公司 A kind of information system holistic health degree appraisal procedure based on big data analysis
CN110543997A (en) * 2018-05-29 2019-12-06 北京国铁盛阳技术有限公司 Method and device for quantifying equipment quality, computer equipment and storage medium
CN112231937A (en) * 2020-11-23 2021-01-15 中煤科工集团沈阳设计研究院有限公司 C-F model based wheel hopper continuous process system reliability evaluation method and system
CN112231314A (en) * 2020-11-05 2021-01-15 深圳市丽湖软件有限公司 Quality data evaluation method based on ETL
CN112288593A (en) * 2020-10-21 2021-01-29 南方电网科学研究院有限责任公司 Evaluation data processing method, device and medium for power grid emergency system
CN113534129A (en) * 2021-06-29 2021-10-22 中国人民解放军93209部队 Method and system for evaluating high-speed target detection performance of foundation broadband radar
CN114066233A (en) * 2021-11-15 2022-02-18 中大检测(湖南)股份有限公司 Scene grading safety risk real-time evaluation method for subdividing index values
CN114745293A (en) * 2022-03-30 2022-07-12 深圳市国电科技通信有限公司 Network communication quality evaluation method and device, electronic equipment and storage medium
CN115982709A (en) * 2022-09-02 2023-04-18 北京永信至诚科技股份有限公司 Network security health state evaluation and display method based on risk data
CN117057681A (en) * 2023-10-12 2023-11-14 航天中认软件测评科技(北京)有限责任公司 Software quality assessment method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227288A (en) * 2008-01-29 2008-07-23 四川大学 Method for evaluating hazardness of network attack
CN103095494A (en) * 2012-12-31 2013-05-08 北京邮电大学 Risk evaluation method of electric power communication network
CN105139268A (en) * 2015-07-14 2015-12-09 国家电网公司 Power grid safety risk assessment method
CN107454105A (en) * 2017-09-15 2017-12-08 北京理工大学 A kind of multidimensional network safety evaluation method based on AHP and grey correlation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227288A (en) * 2008-01-29 2008-07-23 四川大学 Method for evaluating hazardness of network attack
CN103095494A (en) * 2012-12-31 2013-05-08 北京邮电大学 Risk evaluation method of electric power communication network
CN105139268A (en) * 2015-07-14 2015-12-09 国家电网公司 Power grid safety risk assessment method
CN107454105A (en) * 2017-09-15 2017-12-08 北京理工大学 A kind of multidimensional network safety evaluation method based on AHP and grey correlation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
谢文: "信息安全风险评估方法研究与应用", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110543997A (en) * 2018-05-29 2019-12-06 北京国铁盛阳技术有限公司 Method and device for quantifying equipment quality, computer equipment and storage medium
CN110543997B (en) * 2018-05-29 2020-12-29 北京国铁盛阳技术有限公司 Method and device for quantifying equipment quality, computer equipment and storage medium
CN109034580A (en) * 2018-07-16 2018-12-18 三门核电有限公司 A kind of information system holistic health degree appraisal procedure based on big data analysis
CN109034580B (en) * 2018-07-16 2020-09-11 三门核电有限公司 Information system overall health degree evaluation method based on big data analysis
CN112288593A (en) * 2020-10-21 2021-01-29 南方电网科学研究院有限责任公司 Evaluation data processing method, device and medium for power grid emergency system
CN112231314A (en) * 2020-11-05 2021-01-15 深圳市丽湖软件有限公司 Quality data evaluation method based on ETL
CN112231937A (en) * 2020-11-23 2021-01-15 中煤科工集团沈阳设计研究院有限公司 C-F model based wheel hopper continuous process system reliability evaluation method and system
CN113534129A (en) * 2021-06-29 2021-10-22 中国人民解放军93209部队 Method and system for evaluating high-speed target detection performance of foundation broadband radar
CN114066233A (en) * 2021-11-15 2022-02-18 中大检测(湖南)股份有限公司 Scene grading safety risk real-time evaluation method for subdividing index values
CN114745293A (en) * 2022-03-30 2022-07-12 深圳市国电科技通信有限公司 Network communication quality evaluation method and device, electronic equipment and storage medium
CN114745293B (en) * 2022-03-30 2023-11-17 深圳市国电科技通信有限公司 Network communication quality evaluation method and device, electronic equipment and storage medium
CN115982709A (en) * 2022-09-02 2023-04-18 北京永信至诚科技股份有限公司 Network security health state evaluation and display method based on risk data
CN117057681A (en) * 2023-10-12 2023-11-14 航天中认软件测评科技(北京)有限责任公司 Software quality assessment method, device, equipment and storage medium
CN117057681B (en) * 2023-10-12 2024-01-16 航天中认软件测评科技(北京)有限责任公司 Software quality assessment method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107944702A (en) A kind of network security step analysis appraisal procedure, device and computer-readable recording medium
CN108683664B (en) A kind of network risk analysis and optimal active defense method based on multi-level betting model
CN110138627B (en) A kind of edge side terminal security access strategy selection method based on security risk quantization
CN108108875A (en) A kind of distribution Running State fuzzy synthetic appraisement method based on cooperative game method and trapezoidal cloud model
CN107623697A (en) A kind of network security situation evaluating method based on attacking and defending Stochastic Game Model
CN111611524B (en) Gas risk assessment and safety supervision resource matching method and device
CN111787011B (en) Intelligent analysis and early warning system, method and storage medium for security threat of information system
CN104320271B (en) A kind of network equipment safety evaluation method and device
Zeng et al. A value and ambiguity-based ranking method of trapezoidal intuitionistic fuzzy numbers and application to decision making
CN107454105A (en) A kind of multidimensional network safety evaluation method based on AHP and grey correlation
CN108494787A (en) A kind of network risk assessment method based on asset association figure
CN106713233A (en) Method for judging and protecting network security state
CN108197848A (en) A kind of energy quality comprehensive assessment method and device based on intuitionistic fuzzy theory
CN109858134A (en) The method of the more change system architectural model buildings of the auxiliary of big data driving
WO2022242181A1 (en) Method and apparatus for evaluating health degree indexes of layers of smart substation
Bettinger et al. Combinatorial optimization of elk habitat effectiveness and timber harvest volume
CN105306486A (en) Markov process-based drug test cloud computing security state evaluation method
CN115640305B (en) Fair and reliable federal learning method based on blockchain
Wu et al. Information systems security risk assessment on improved fuzzy AHP
CN113642669B (en) Feature analysis-based fraud prevention detection method, device, equipment and storage medium
CN115550077A (en) Real-time online detection danger source data and trigger automatic defense method
Luo et al. Information security risk assessment based on two stages decision model with grey synthetic measure
CN114971180A (en) Network system risk assessment method and device, computer equipment and storage medium
Wang et al. New approach for information security evaluation and management of IT systems in educational institutions
CN110298058A (en) A kind of power grid supervision index key element extracting method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180420