skip to main content
10.1145/3585967.3585987acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicwcsnConference Proceedingsconference-collections
research-article

Research on Network Security Evaluation Model Based on AHP and BP Neural Network

Published:19 April 2023Publication History

ABSTRACT

The Internet's sharing and openness have made information interaction more vulnerable to security risks. As a result, a comprehensive evaluation of the security of computer network systems has become a more effective means of preventing various network security problems. In recent years, there have been many network security evaluation methods proposed to address this issue, but not all of them are effective. Therefore, this paper analyzes existing network security evaluation methods and proposes a new model based on BP neural network and AHP jointly. The proposed model combines the advantages of BP neural network and hierarchical analysis (AHP) to provide a comprehensive and accurate evaluation of network security. The BP neural network is used to evaluate the risk level of each security factor, while AHP is used to calculate the weights of each security factor. The weights reflect the relative importance of each factor in determining the overall security level of the network. To verify the applicability of the proposed model, empirical research is conducted. The results demonstrate that the model can effectively evaluate network security comprehensively. The model's accuracy and effectiveness make it a promising approach to evaluate the security of computer network systems. Additionally, it can help in developing strategies to enhance network security by identifying potential vulnerabilities and assessing the effectiveness of security measures implemented. In conclusion, the model provides a useful tool for organizations to manage network security effectively.

References

  1. Jun Zhang, Longwei Hu, Yu Sun, et.al. AHP and BP neural network based evaluation model for assembly building suppliers. Journal of Qingdao University of Technology, 43 (01), pp.18-23, 2022.Google ScholarGoogle Scholar
  2. Yang Yang, Lin Yang, Bo Wu, et.al. Corrigendum to “safety prediction using vehicle safety evaluation model passing on long-span bridge with fully connected neural network”. Advances in Civil Engineering, 32 (03), pp.55-57, 2020.Google ScholarGoogle Scholar
  3. Zhaohui Chu, Wenjing Chu, Lixiang Xu, et.al. Optimization model construction of urban mobile library service quality evaluation based on AHP-BP neural network. Researches in Library Science, 10, pp.19-27, 2020.Google ScholarGoogle Scholar
  4. Shijing Huang, Guohua Chen, Chuanhui Wu, et.al. Database evaluation index model construction for research projects based on improved AHP-BP neural network. Information Science, 38 (01), pp.140-146, 2020.Google ScholarGoogle Scholar
  5. Xiaozhang Zhong.Comprehensive evaluation of levee safety based on improved BP neural network model. Heilongjiang Hydraulic Science and Technology, 47 (06), pp.226-230, 2019.Google ScholarGoogle Scholar
  6. Weide Qiao. Teaching quality evaluation model of flipped classroom based on AHP and BP neural network. Journal of Wenzhou Vocational & Technical College, 18 (04), pp.57-64, 2018,Google ScholarGoogle Scholar
  7. Long Zhou, Wei Guo, Jianyong Wang, et.al. Network security evaluation model based on neural network algorithm. Journal of Shenyang University of Technology, 40 (04), pp.426-430, 2018.Google ScholarGoogle Scholar
  8. Siqin Wen, Biao Wang. Simulation model of computer network security evaluation based on neural network. Modern Electronic Technology, 40 (03), pp.89-91, 2017.Google ScholarGoogle Scholar
  9. Yanjie Dou. Research on integrity evaluation system of real estate appraisal agencies–Also on integrity evaluation model based on AHP-BP neural network. Journal of Tianjin Collece of Commerce, 03 (05), pp.23-27, 2015.Google ScholarGoogle Scholar
  10. Gang Wang, Xiaoqing Zeng, Jian Li. Method for evaluation of railway dynamic safety based on 5M model and neural network algorithm. Applied Mechanics and Materials, 3862 (743), pp.902-904, 2015.Google ScholarGoogle Scholar
  11. Changjun Hu. Application of double hidden layer BP neural network model in regional water security evaluation. Journal of Water Resources and Water Engineering, 24 (03), pp.196-200, 2013.Google ScholarGoogle Scholar

Index Terms

  1. Research on Network Security Evaluation Model Based on AHP and BP Neural Network

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      icWCSN '23: Proceedings of the 2023 10th International Conference on Wireless Communication and Sensor Networks
      January 2023
      162 pages
      ISBN:9781450398466
      DOI:10.1145/3585967

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 April 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)28
      • Downloads (Last 6 weeks)2

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format