The Evaluation Model for Network Security

After analyzing and quantifying the network information security elements: confidentiality, integrity and availability, this paper defines the network security confidentiality vector, the network security integrity vector and the network security availability vector, and also builds the hierarchical indicator system of network security evaluation. Based on the positive and negative ideal comparison standards, the evaluation indicator elements are processed in the dimensionless grey method, and a qualitative-quantitative evaluation model with multilayer linear weight for the network security is put forward. Finally, the feasibility and validity of the model are verified by analyzing some practical examples.

[1]  Rayford B. Vaughn,et al.  An Approach to Model Network Exploitations Using Exploitation Graphs , 2006, Simul..

[2]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.