Logo Goletty

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation—M(1,2,3)
Journal Title Journal of Networks
Journal Abbreviation jnw
Publisher Group Academy Publisher
Website http://ojs.academypublisher.com
PDF (422 kb)
   
Title Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation—M(1,2,3)
Authors Ruan, Junhu; Jiang, Hua
Abstract Network security has close relationships with the physical environment of information carriers, information transmission, information storage, information management and so on, and these relations have much ambiguity. Therefore, it is reasonable and scientific to apply fuzzy comprehensive evaluation method for network security fuzzy evaluation. The core of network security fuzzy evaluation is membership degree transformation calculation. But the transformation methods should be discussed, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy to mine knowledge information about object classification hidden in every index, affirm the relationship of object classification and index membership, eliminate the redundant data in index membership for object classification by defining distinguishable weight and extract valid values to compute object membership. The new algorithm of membership degree transformation includes three calculation steps which can be summarized as “effective, comparison and composition”, which is denoted as M(1,2,3). The paper applied the new algorithm in network security fuzzy evaluation.
Publisher ACADEMY PUBLISHER
Date 2009-07-01
Source Journal of Networks Vol 4, No 5 (2009)
Rights Copyright © ACADEMY PUBLISHER - All Rights Reserved.To request permission, please check out URL: http://www.academypublisher.com/copyrightpermission.html. 

 

See other article in the same Issue


Goletty © 2024