Abstract
With the rapid development of networks, network security is a serious problem. To evaluate a network accurately, this paper proposes a network risk evaluation method based on a differential manifold (DM) and research on traditional methods. The DM divides the network risk evaluation into network structure risk and network behavior risk evaluations. Network structure risk evaluates the network identity, and network behavior risk evaluates the attack and defense of the network. Network assets and asset vulnerabilities characterize a network, and the analytic hierarchy process (AHP) and the Common Vulnerability Scoring System (CVSS) are combined to evaluate the network identity. Network behavior causes high-dimensional indicator changes, and DMs are used to measure network behavior. To examine the effectiveness and accuracy of DMs, two experiments were performed. The experimental results show that the DM method is valid and accurate for evaluating network risk.
Highlights
The rapid development of the Internet has brought about many network security issues, such as leaks of personal information, hacker attacks, and blackmail viruses
To evaluate network risks comprehensively and objectively, this paper proposes a network risk assessment method based on a differential manifold (DM)
WORK To comprehensively evaluate network risk, this paper divides the metric into two parts: network structure risk evaluation and network behavior risk evaluation
Summary
The rapid development of the Internet has brought about many network security issues, such as leaks of personal information, hacker attacks, and blackmail viruses. To evaluate network risks comprehensively and objectively, this paper proposes a network risk assessment method based on a differential manifold (DM). The measurement is aimed at evaluating the structure and behavior risks. DM-based evaluation includes two aspects: evaluating the network structure and evaluating the network behavior risks. The experimental results show that the DM can measure network risk effectively, accurately and comprehensively. (3) Compared to AHP-based evaluation method with expert weight, this paper provides a mathematical model based on DM to describe the network attack and defense process.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have