Abstract
This paper discusses in detail the theory of non-optimum analysis on network systems. It points out that the main problem of exploring indefinite networks’ optimum lies in the lack of non-optimum analysis on the network system. The paper establishes the syndrome and empirical analysis based on the non-optimum category of the network security. At the same time, it also puts forward the non-optimum measurement of the network security along with non-optimum tracing and self-organization of the network systems. The formation of non-optimum network serves as the basis for existence of optimum network. Besides, the level of network security can be measured from the non-optimum characteristics analysis of network systems. By summing the practice, this paper has also come at the minimum non-optimum principle of the network security optimization, established the relationship between risk and non-optimum, and put forward evaluation method about trust degree of network security. Finally, according to the previous practice of network security risk management, a kind of network security optimization has been developed to approach the relationship of non-optimum and risk.
Highlights
Network security, as a technology with the fastest rate of development and application in all branches of business, requires adequate protection to provide high security
Optimization involves Operations Research techniques that have been used for years in designing networks, transportation system, and manufacturing systems can be applied to optimizing network security
In the context of system, we can sort out some items or the risk universe based on empirical characteristics of non-optimum system, which includes the following:
Summary
As a technology with the fastest rate of development and application in all branches of business, requires adequate protection to provide high security. Optimization involves Operations Research techniques that have been used for years in designing networks, transportation system, and manufacturing systems can be applied to optimizing network security. As the network systems heads to the orderly dynamic condition, some of the hidden troubles are not exposed, the achieved most optical modes are in unstable states. This implies that the recognition and practice of mankind is featured by the exploration and pursuit in an optimum category, and, under many conditions, in a non-optimum category. Conclusion puts forward the discoveries of this research and future research direction
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.