2018
DOI: 10.1007/s11277-017-5202-3
|View full text |Cite
|
Sign up to set email alerts
|

Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(17 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…They applied risk assessment techniques to calculate attack risk levels for a specific entity and offer some countermeasures for individual attack sequences. Similarly, H. Wang et al in [ 30 ] utilized a quantification method to enhance cyber-situational awareness. Analytic hierarchy process [ 31 , 32 ], along with D-S evidence theory [ 33 ], was utilized to fuse multi-source data, and eventually streamline the cyber-situational assessment process.…”
Section: State Of the Artmentioning
confidence: 99%
“…They applied risk assessment techniques to calculate attack risk levels for a specific entity and offer some countermeasures for individual attack sequences. Similarly, H. Wang et al in [ 30 ] utilized a quantification method to enhance cyber-situational awareness. Analytic hierarchy process [ 31 , 32 ], along with D-S evidence theory [ 33 ], was utilized to fuse multi-source data, and eventually streamline the cyber-situational assessment process.…”
Section: State Of the Artmentioning
confidence: 99%
“…Yang et al [8] proposed a cloud computing risk assessment model that used the Markov chain (MC) model to describe the random risk environment and measured the risk value through information entropy (IE). Wang et al [9] combined the analytic hierarchy process (AHP) with the hierarchical model of situational assessment and integrated the fuzzy results of multisource equipment with D-S evidence theory to solve the problem of single information source and large deviation of accuracy. Because the evaluation method based on the mathematical model is greatly influenced by subjective factors and there is no objective and unified standard definition variable, it is usually unable to achieve relatively perfect evaluation results.…”
Section: Related Workmentioning
confidence: 99%
“…Wang et al [6] designed a hierarchical NSSA method based on an analytic hierarchy process (AHP), which used the hierarchical cyber threat situation assessment (CSA) indicator system constructed by AHP to decide the network threat weight values. Wang et al [7] proposed an AHPbased NSSA and quantification method, which utilized the AHP and hierarchical situation assessment model to simplify the NSSA problem. Li et al [8] adopted fuzzy optimal clustering criteria combined with c-means clustering to process the indicator data, thus getting the number of clusters and the optimal clustering center.…”
Section: Introductionmentioning
confidence: 99%