Fuzzy evaluation on network security based on the new algorithm of membership degree transformation-M(1, 2, 3)
作者:
H Jiang,J Ruan
关键词:
network security ; membership degree transformation ; fuzzy evaluation ; M(1 ; 3) model
摘要:
Network security has close relationships with the physical environment of information carriers, information transmission, information storage, information management and so on, and these relations have much ambiguity. Therefore, it is reasonable and scientific to apply fuzzy comprehensive evaluation method for network security fuzzy evaluation. The core of network security fuzzy evaluation is membership degree transformation calculation. But the transformation methods should be discussed, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy to mine knowledge information about object classification hidden in every index, affirm the relationship of object classification and index membership, eliminate the redundant data in index membership for object classification by defining distinguishable weight and extract valid values to compute object membership. The new algorithm of membership degree transformation includes three calculation steps which can be summarized as 鈥渆ffective, comparison and composition鈥, which i
在线下载