Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Mathematics in Practice and Theory》 2013-17
Add to Favorite Get Latest Update

Fuzzy Risk Assessment for Campus Network System Based on Entropy Theory

FU Sha;LIU Wen-bin;XUE Juan;Hunan University of Finance and Economics;  
The paper proposed a fuzzy risk assessment method based on the entropy theory,and apply it to the campus network system risk assessment,for the phenomenon of over-reliance on subjective assignment in information systems risk assessment.It constructs the hierarchical structure model of a campus network system of risk assessment,using the combination of analytic hierarchy process and fuzzy logic to analysis the risk value of various risk factors,to evaluate the risk factors of concern in the system.On this basis,calculate the risk degree of the entire system through the entropy theory to evaluate the overall risk profile of the campus network system,and the case study shows that this method is feasible and effective.
【Fund】: 湖南省高等学校科学研究项目(12C0559)
【CateGory Index】: TP315;O159
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 5 Hits
1 FU Yu1,WU Xiao-ping1,YE Qing1,PENG Xi2(1.Department of Information Security,Naval University of Engineering,Wuhan,Hubei 430033,China;2.Department of Computer Science,Hua Zhong Normal University,Wuhan,Hubei 430079,China);An Approach for Information Systems Security Risk Assessment on Fuzzy Set and Entropy-Weight[J];Acta Electronica Sinica;2010-07
2 ZHAO Dong-mei1,LIU Hai-feng2,ZHANG Jun-peng1 1.School of Information Technology of Hebei Normal University,Shijiazhuang 050016,China 2.Department of Science and Technology of Hebei Normal University,Shijiazhuang 050016,China;Model of risk assessment of information security based on fuzzy neural network[J];Computer Engineering and Applications;2009-17
3 QIN Da-li1,3,ZHANG Li2,LI Ji-hui2(1.College of Mechanical and Auto Engineering,Hunan University,Changsha 410082;2.Research Office of System Hidden Fault,China Information Technology Security Evaluation Center,Beijing 100089;3.College of Information Science and Technology,Hunan Agricultural University,Changsha 410128);Risk Assessment Approach for Information Security Based on FAHP[J];Computer Engineering;2009-15
4 ZHAO Dong-mei1,MA Jian-feng1,WANG Yue-sheng2(1.Computer Science and Technology,Xidian University,Xi’an 710071,China;2.Information Technology,Hebei Normal University,Shijiazhuang 050016,China);Model of fuzzy risk assessment of the information system[J];Journal on Communications;2007-04
5 FU Yu,WU Xiaoping,YAN Chenghua(Department of Information Security,Naval University of Engineering,Wuhan 430033,Hubei,China);The Method of Information Security Risk Assessment Using Bayesian Networks[J];Journal of Wuhan University(Natural Science Edition);2006-05
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 AN Shi1,3,LONG Jiang2,4 (1.Research Center of Technology,Policy and Management,Harbin Institute of Technology;Harbin,Heilongjiang 150001,China;2.School of Management,Harbin Institute of Technology,Harbin,Heilongjiang 150001,China; 3.School of Transportation Science and Engineering,Harbin Institute of Technology,Harbin,Heilongjiang 150090,China;4.China Academy of Space Technology,Beijing 100086,China);Model of Satellite System State Evaluation Based on Bayers Network[J];Transactions of Beijing Institute of Technology;2010-05
2 Lü Zhen-bang1,2,ZHOU Bo1 (1.Aeronautics Computing Technique Research Institute,Xi'an 710068,China;2.School of Computer Science and Technology,Xidian University,Xi'an 710071,China);Hierarchical Risk Assessment Based on Shapley Entropies and Choquet Integrals[J];Journal of Beijing University of Posts and Telecommunications;2009-06
3 CAO Yinyin(School of Information Science and Technology,Yangcheng Normal University,Yancheng 224002,China);Destroying Effect-controlling Model of Malicious Code Based on Network Confrontation[J];Journal of Chengdu University(Natural Science Edition);2010-02
4 FU Yu1,WU Xiao-ping1,YE Qing1,PENG Xi2(1.Department of Information Security,Naval University of Engineering,Wuhan,Hubei 430033,China;2.Department of Computer Science,Hua Zhong Normal University,Wuhan,Hubei 430079,China);An Approach for Information Systems Security Risk Assessment on Fuzzy Set and Entropy-Weight[J];Acta Electronica Sinica;2010-07
5 ZHAO Xing-wang1,2,LIANG Ji-ye1,2,CAO Fu-yuan1,2(1.College of Computer and Information Technology,Shanxi University,Taiyuan 030006,China;2.Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education,Taiyuan 030006,China);A Method of Determining Best Number of Clusters for Categorical Data[J];Journal of Guangxi Normal University(Natural Science Edition);2009-03
6 MA Nan-nan1,2,LIANG Ji-ye1,2,WANG Feng1,2,QIAN Yu-hua1,2(1.School of Computer and Information Technology,Shanxi University,Taiyuan Shanxi 030006,China;2.Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education,Taiyuan Shanxi 030006,China);A Feature Selection Algorithm of Ordered Decision Tables[J];Journal of Guangxi Normal University(Natural Science Edition);2010-03
7 LIU Huan,ZHAO Gang(School of Information Management,Beijing Information Science and Technology University,Beijing 100192,China);Application of artificial intelligence to information system security risk assessment[J];Journal of Beijing Information Science & Technology University;2012-04
8 Chen Chen (Lanzhou University of Finance and Economics,Lanzhou,Gansu 730020,China);Evaluation of Cloud Computing Platform Reliability for Digital Library based on Dominance Decision Rules[J];Library Work in Colleges and Universities;2013-01
9 WANG Chao,CHEN Xing-yuan(The PLA Information Engineering University,Zhengzhou,Henan 450004,China);An Approach for Security Analysis to Access Control Policy Based on Entropy-Weigh[J];Acta Electronica Sinica;2013-01
10 CAO Li-feng,CHEN Xing-yuan,DU Xue-hui,SHAO Jing(The PLA Information Engineering University,Zhengzhou,Henan 450004,China);A Level Inference Method for Aggregated Information of Objects Based on Associated Attributes[J];Acta Electronica Sinica;2013-07
China Proceedings of conference Full-text Database 2 Hits
1 Xilei Pang~(1,2,3) Chongfu Huang~(1,2,3) Sijian Zhao~(1,2,3) 1 State Key Laboratory of Earth Surface Processes and Resources Ecology(Beijing Normal University),Beijing 100875,China 2 Key Laboratory of Environmental Change and Natural Disaster,Ministry of Education of China,Beijing Normal University,Beijing 100875,China 3 Academy of Disaster Reduction and Emergency Management,Ministry of Civil Affairs & Ministry of Education,the Peoples' Republic of China,Beijing 100875,China;Research Tracking of the Methods and Technologies on Risk Analysis of Natural Disaster[A];[C];2010
2 Lin Wei Wang Xiaodong College of Mathematics and Computer Science, Fuzhou University, Fuzhou, 350002, China;Hybrid Quantitative Method Based on PCA for Information System Risk Assessment[A];[C];2008
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Wen-hui1,DU Bai-chuan2,YANG Ying-yun1 (1.Communication University of China,Beijing 100024,China;2.State Administration of Radio,Film and Television,Beijing 100045,China);Application of Fuzzy Analytic Hierarchy Process to TV and Radio Information Assurance Evaluation Indicator Systems[J];Acta Electronica Sinica;2008-10
2 Zhu Yan 1,2 Yang Yongtian 1 Zhang Yuqing 2 Feng Dengguo 21 (Computer Science and Technology School,Harbin Engineering University,Harbin150001) 2 (The Chinese Academy of Sciences,National Computer Network Intrusion Protection Center,Beijing100039);Research on Information Security Evaluation Model Based on Hierarchy Structure[J];Computer Engineering and Applications;2004-06
3 Xu Fuyong Shen Jian Li Jianying (School of Information Science and Engineering,Lanzhou University,Lanzhou 730000);Study on Comprehensive Assessment Method for Network Security Based on AHP and ANN[J];Computer Engineering and Applications;2005-29
4 ;The Linear Reasoning of Bayesian Networks[J];Computer Science;1999-10
5 ZHAO Dongmei1,2,ZHANG Yuqing3,MA Jianfeng1 (1.School of Computer Science and Engineering , Xidian University , Xi'an 710071; 2.Computing Center, Hebei Normal University, Shijiazhuang 050016; 3.National Computer Network Intrusion Protection Center , GSCAS , Beijing 100039);Fuzzy Risk Assessment of Entropy-weight Coefficient Method Applied in Network Security[J];Computer Engineering;2004-18
6 SUN Tie1,2 ,ZHANG Yuqing2,MENG Xiangwu1 (1.School of Computer, Beijing University of Posts and Telecommunications, Beijing 100088; 2.National Computer Network Intrusion Protection Center, CAS, Beijing 100039);Design of Risk-assess Tools Based on BS7799[J];Computer Engineering;2004-22
7 YANG Hong-yu1,2,LI Yong1,CHEN Chuang-xi3(1.Software Research Center,Civil Aviation University of China,Tianjin 300300;2.Tianjin Key Lab for Advanced Signal Processing,Civil Aviation University of China,Tianjin 300300;3.Computer Center,China Southern Airlines Company Ltd.,Guangzhou 510406);Risk Calculation for Information System Based on Fuzzy Theory[J];Computer Engineering;2007-16
8 ZHANG Jiang She 1) LEUNG Yee 2) XU Zong Ben 1) 1) (Institute for Information and System Sciences, Faculty of Science, Xi′an Jiaotong University, Xi′an 710049) 2) (Department of Geography and Joint Laboratory for Geo;Clustering Methods by Simulating Visual Systems[J];Chinese Journal of Computers;2001-05
9 CHENG Xiang-yun~1,WANG Ying-mei~1,LIU Zeng-liang~2(1.University of Science and Technology Beijing,Beijing 100083,China;2.National Defense Academy,Beijing 100011,China);A Quantitative Risk Assessment Model for Information Security[J];Journal of Air Force Engineering University(Natural Science Edition);2005-06
10 LIU Fang,DAI Kui,WANG Zhi-ying, CAI Zhi-ping (School of Computer, National University of Defense Technology, Changsha 410073,China);Research on the Technology of Quantitative Security Evaluation Based on Fuzzy Number Arithmetic Operations[J];Fuzzy Systems and Mathematics;2004-04
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved