期刊文献+

一种基于模糊综合评价的IMS网络攻击后果评估方法 被引量:4

Evaluation method for IMS network attack effect based on fuzzy comprehensive evaluation
下载PDF
导出
摘要 为定量认识IMS网络攻击的影响,提出了一种基于模糊综合评价的IMS网络攻击后果评估方法。通过分析可能的攻击流程建立了相应的攻击因素树,引入层次分析法计算评价因素的权值,然后利用模糊综合评价法对IMS的攻击后果进行综合评估。为了降低由单一模糊算子特点带来的评估偏差,选取了几种不同特点的算子分别进行评估,并取其均值为最终评价结果。实例验证了该评估方法能有效地区分不同攻击方式带来的攻击后果,能够为IMS网络的安全防护提供一定的参考。 For the purpose of a quantitative understand for IMS network's attack effect, this paper introduced an evaluation method for IMS's attack effect based on fuzzy comprehensive evaluation. It constructed the attack index tree on the basis of analyzing the possible attack flow, and introduced analytic hierarchy process to compute the indexes' power, and made comprehensive evaluation for IMS attack effects using the fuzzy comprehensive evaluation. To reduce the warp brought by the single fuzzy operator's properties, it selected several operators with different properties to evaluate and took the mean as the finally result. Finally, the examples validate the evaluation method is able to distinguish the attack effects resulted by different attack methods effectively, and can provide a reference to the security of IMS.
出处 《计算机应用研究》 CSCD 北大核心 2013年第11期3400-3403,3406,共5页 Application Research of Computers
基金 国家"863"计划基金资助项目(2011AA010605)
关键词 IP多媒体子系统 攻击评估 模糊综合评价 IMS (IP multimedia subsystem) attack evaluation fuzzy comprehensive evaluation
  • 相关文献

参考文献15

  • 1SHUANG Kai, WANG Si-yuan,ZHANG Bo. IMS security analysis using mtdfi-attribute model [J]. Journal of Networks,2011,6(2) :263-271. 被引量:1
  • 2DONG Wang. Model-based vulnerability analysis of IMS network [J]. Journal of Natworks,2009,4(4) :254-262. 被引量:1
  • 3PAULINS N, RIVZA P. Vulnerability analysis of IP multimedia sub- system[ C] //Proe of International Conference on Applied Information and Communication Technologies. 2012: 104-111. 被引量:1
  • 4冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 5PENG Zi-mei ,ZHAO Wen-tao,LONG Jun. Grey synthetic clustering method for DoS attack effectiveness evaluation[ C ]//Proc of Modeling Decision for Artificial Intelligence. Berlin: Springer-Verlag,2011:139-149. 被引量:1
  • 6王永杰,江亮,鲜明,陈志杰,王国玉.网络攻击效果在线评估模型与算法研究[J].计算机科学,2007,34(5):72-74. 被引量:6
  • 7CAO Yah, ZHANG Li-juan, WU Hao. An evaluation system for net- work attack effect based on fuzzy [ J ]. Application Research of Computer ,2009,26 (8) :3058- 3062. 被引量:1
  • 8费军,余丽华.基于模糊层次分析法的计算机网络安全评价[J].计算机应用与软件,2011,28(10):120-123. 被引量:25
  • 9苏旭..IMS脆弱性评估方法的研究与实现[D].北京邮电大学,2009:
  • 10WANG Yu-long,YANG Yi. PVL: a novel metric for single vulnera- bility rating and its application in IMS [ J ]. dotJrrlal of Computa- tional Information Systems,2012,8(2) :579-590. 被引量:1

二级参考文献74

共引文献432

同被引文献36

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部