An improved multilevel fuzzy comprehensive evaluation algorithm for security performance

Abstract It is of great importance to take various factors into account when evaluating the network security performance. Multilevel fuzzy comprehensive evaluation is a relatively valid method. However, the traditional multilevel fuzzy comprehensive evaluation algorithm relies on the expert's knowledge and experiences excessively, and the result of the evaluation is usually less accurate. In this article, an improved multilevel fuzzy comprehensive evaluation algorithm, based on fuzzy sets core and entropy weight is presented. Furthermore, a multilevel fuzzy comprehensive evaluation model of P2P network security performance has also been designed, and the improved algorithm is used to make an instant computation based on the model. The advantages of the improved algorithm can be embodied in comparison with the traditional evaluation algorithm.

[1]  Sumit Ghosh,et al.  A survey of recent advances in fuzzy logic in telecommunications networks and new challenges , 1998, IEEE Trans. Fuzzy Syst..

[2]  Wang Hua Multilevel fuzzy comprehensive evaluation method of network security , 2004 .

[3]  Akhil Sahai,et al.  A secure platform for peer-to-peer computing in the Internet , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[4]  Wen Dou,et al.  Trust based incentive in P2P network , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.

[5]  Miao Qiny Characteristic Information Fusion Method on Network Security Strategic Indication/Warning System , 2002 .

[6]  Michael K. Reiter,et al.  Toward acceptable metrics of authentication , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[7]  Lu Jian Properties of Measure-based Fuzzy Logic , 2001 .

[8]  WuMeng,et al.  Fuzzy Mapping NetWork Using Hierarchical Genetically Learning Rules , 1994 .

[9]  Shyi-Ming Chen,et al.  Document retrieval using fuzzy-valued concept networks , 2001, IEEE Trans. Syst. Man Cybern. Part B.

[10]  Robert Tappan Morris,et al.  Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.