A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making Theory

In this paper, we present a novel network security evaluation method framework, with a comprehensive analysis of the MADM (Multiple Attribute Decision Making) theory. This framework constructs a measurement model of network security, and normalizes the measurement process. It also provides specific evaluation methods to satisfying the practical requirements. Thereinafter, an example of network worm propagation evaluation is illustrated. Compared to existing evaluation methods, our methods are more comprehensive and scientific, and can make the rank preference order of each worm life cycle stage of each worm defense strategy. Our approach makes contribution on the standardization and scientific of the network security evaluation process.

[1]  Xiaohui Kuang,et al.  Research on Technologies of Building Experimental Environment for Network Worm Simulation , 2009, 2009 15th International Conference on Parallel and Distributed Systems.

[2]  Ying-Ming Wang,et al.  Fuzzy TOPSIS method based on alpha level sets with an application to bridge risk assessment , 2006, Expert Syst. Appl..

[3]  Chen-Tung Chen,et al.  Extensions of the TOPSIS for group decision-making under fuzzy environment , 2000, Fuzzy Sets Syst..

[4]  Tomas Olovsson,et al.  A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior , 1997, IEEE Trans. Software Eng..

[5]  Mohammad Izadikhah,et al.  An algorithmic method to extend TOPSIS for decision-making problems with interval data , 2006, Appl. Math. Comput..

[6]  Taho Yang,et al.  Multiple-attribute decision making methods for plant layout design problem , 2007 .

[7]  Bharat B. Madan,et al.  Modeling and quantification of security attributes of software systems , 2002, Proceedings International Conference on Dependable Systems and Networks.

[8]  Guangtao Fu,et al.  A fuzzy optimization method for multicriteria decision making: An application to reservoir flood control operation , 2008, Expert Syst. Appl..

[9]  Evangelos Triantaphyllou,et al.  Development and evaluation of five fuzzy multiattribute decision-making methods , 1996, Int. J. Approx. Reason..

[10]  Ming Chu,et al.  An integrated framework for the assessment of network operations, reliability, and security , 2004, Bell Labs Technical Journal.

[11]  Mohammad Izadikhah,et al.  Extension of the TOPSIS method for decision-making problems with fuzzy data , 2006, Appl. Math. Comput..

[12]  Matthew M. Williamson,et al.  Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[13]  Rodolphe Ortalo,et al.  Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..

[14]  Ching-Lai Hwang,et al.  Multiple Attribute Decision Making: Methods and Applications - A State-of-the-Art Survey , 1981, Lecture Notes in Economics and Mathematical Systems.

[15]  Ching-Lai Hwang,et al.  Multiple Attribute Decision Making — An Overview , 1992 .

[16]  Ching-Lai Hwang,et al.  Fuzzy Multiple Attribute Decision Making - Methods and Applications , 1992, Lecture Notes in Economics and Mathematical Systems.