Skip to main content
Log in

Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In hierarchical network security situation assessment model, there are many problems, such as subjective index weight factor, large evaluation index system, large amount of calculation and low efficiency. A network security situation assessment model and quantification method based on AHP is proposed to solve this problem. The AHP analytic hierarchy process (AHP) is combined with the hierarchical model of situation assessment to simplify the situation assessment problem. The D–S evidence theory is used to fuse the fuzzy results of multi-source equipment to solve the problem of single information source and large deviation of accuracy. Through the construction of three evaluation indexes of risk situation, basic operation situation and damage situation, the problem of large evaluation index system and low evaluation efficiency is solved. AHP analytic hierarchy process is used to determine the weights of different index items, so as to avoid the subjectivity and randomness of weighting factors. The simulation results show that the model can reflect the security status of the network as a whole, and the situation assessment is accurate and can better serve the high-level decision-making.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig.. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Hu, G. Y., & Qiao, P. L. (2015). An efficient improvement of CMA-ES algorithm for the network security situation prediction. The Open Automation and Control Systems Journal, 7(1), 1499–1517.

    Article  Google Scholar 

  2. Wang, Y. Z., Li, J. Y., Meng, K., et al. (2013). Modeling and security analysis of enterprise network using attack–defense stochastic game Petri nets. Security and Communication Networks, 6(I), 89–99.

    Article  Google Scholar 

  3. Liu, X. W., Wang, H. Q., Lu, H. W., Yu, J. G., & Zhang, S. W. (2016). Fusion-based cognitive awareness-control model for network security situation. Journal of Software, 27(8), 2099–2114.

    MathSciNet  Google Scholar 

  4. Wang, H., Gu, J., Su, W., Zhao, Z. P. (2016). An evaluation method of multi-source information fusion based on network security situation. In The 7th international symposium on computational intelligence and industrial applications (pp. 1–7). ISCIIA2016.

  5. Xie, L. X., Wang, Y. C., & Yu, J. B. (2013). Network security situation awareness based on neural networks. Journal Tsinghua University: Science & Technology, 23(12), 1750–1760.

    Google Scholar 

  6. Kotenko, I, Doynikova, E. (2014). Security evaluation for cyber situational awareness. In Proceedings of the high performance computing and communications (pp. 1197–1204).

  7. Ramasso, E., & Denoeux, T. (2014). Making use of partial knowledge about hidden States in HMMS: An approach based on belief functions. IEEE Transactions On Fuzzy System, 22(2), 395–405.

    Article  Google Scholar 

  8. Luo, Y. X., Zhao, M. H., Zhang, Q. Y., & Zou, A. J. (2011). Network security situation awareness model-inspired by immune. Advanced Materials Research, 267, 635–638.

    Article  Google Scholar 

  9. Anthony, C., Chao, Y., Sirisak, K., et al. (2007). Network-based accessibility measures for vulnerability analysis of degradable transportation networks. Networks and spatial economics, 3, 241–256.

    MATH  Google Scholar 

  10. Tony, H. G., Timothy, C. M., Alan, T. M., et al. (2008). Comparative approaches for assessing network vulnerability. International regional science review, 1, 88–112.

    Google Scholar 

  11. Erik, J., & Lars, G. M. (2012). Road network vulnerability analysis of area-covering disruptions: A grid-based approach with case study. Transportation research, part A. Policy and Practice, 5, 746–760.

    Google Scholar 

  12. Wang, X. Z. (2016). Network information security situation assessment based on bayesian network. International Journal of Security and its Applications, 5, 129–138.

    Article  Google Scholar 

  13. Wang, Y. (2016). Research on network security situation prediction based on markov game theory. International Journal of Security and its Applications, 9, 301–308.

    Google Scholar 

  14. Wang, H., Gu, J., Di, X. Q., Liu, D., Zhao, J. P., & Sui, X. (2017). Research on classification and recognition of attacking factors based on radial basis function neural network. Cluster Computing. https://doi.org/10.1007/s10586-017-1371-9.

    Google Scholar 

  15. Liu, N., Li, G., Liu, Y. (2011). A method of network security situation prediction based on gray neural network model. In International conference on mechanical engineering, industry and manufacturing engineering (MEIME2011) (pp. 928–931). Trans Tech Publications.

  16. Xiao, J. Q. (2012). Prediction of networks security situation based on wavelet kernel function network. In China Japan international conference on numbers, intelligence, manufacturing technology and machinery automation (MAMT 2011) (pp. 51–56). Trans Tech Publications.

  17. Mo, X. J. (2014). Study on information security of network-based manufacturing environment. In International conference on green power, materials and manufacturing technology and applications (pp. 483–486). Trans Tech Publications.

  18. Lu, S.S., Wang, X. F., Mao, L.,(2014). Network security situation awareness based on network simulation. In IEEE workshop on electronics, computer and applications (pp. 512–517). Institute of Electrical and Electronics Engineers.

  19. Wang, Y. Z., Yu, M., Li, J. Y., et al. (2012). Stochastic game net and applications in security analysis for enterprise network. International Journal of Information Security, 11(1), 41–52.

    Article  Google Scholar 

  20. Yan, G. H., Lee, R., Kent, A., et al.(2012). Towards a Bayesian network game framework for evaluating DDoS attacks and defense. In CCS’12 Proceedings of the 2012 ACM conference on computer and communications security (pp. 553–566). USA:ACM.

  21. Liu, G., Li, Q. M., & Zhang, H. (2013). Defense strategy generation method for network security based on state attack-defense graph. Journal of Computer Applications, 33(S1), 121–125.

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by Key Science and Technology Project of Jilin Province (20160204019GX) and National Defense Scientific and Technological Innovation Special Zone Project of China (17-163-11-ZT-003-020-01).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianping Zhao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, H., Chen, Z., Feng, X. et al. Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process. Wireless Pers Commun 102, 1401–1420 (2018). https://doi.org/10.1007/s11277-017-5202-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-5202-3

Keywords

Navigation