检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:李依霖[1] LI Yi-lin(City College of Jinlin Jianzhu University,Changchun Jilin 130114,China)
出 处:《计算机仿真》2020年第6期156-159,164,共5页Computer Simulation
摘 要:针对传统的入侵风险评估方法存在的入侵风险值偏离实际结果、抗攻击性能较差等问题,提出一种基于熵权和模糊集理论的复杂网络大数据隐私信息传输入侵风险评估方法。根据风险度来评估复杂网络大规模隐私信息被入侵的风险等级,利用风险等级结合模糊综合评判法建立评判集,采用熵权系数法,对评判集中的向量进行计算,获取入侵风险因素并对其进行归一化处理,获得风险因素的综合权值。将综合权值视为入侵者选取隐私信息传输脆弱点当作入侵节点的可能性概率,利用脆弱性量化值进行入侵节点难度值的等级评估,选取其入侵节点威胁等级参数,根据该参数实现对复杂网络大数据隐私信息传输入侵风险评估。实验结果证明,所提方法可以快速、精确地完成入侵风险评估。Traditionally,the risk assessment methods lead to poor anti-attack performance.Therefore,this paper presented a method to assess the intrusion risk in complex network big data privacy information transmission based on entropy weight and fuzzy set theory.According to the risk level,the risk level of large-scale private information intrusion in complex network was evaluated.The risk level was combined with the fuzzy comprehensive evaluation method to establish the evaluation set.Moreover,the entropy weight coefficient method was used to calculate the vector in evaluation set,so that the intrusion risk factor was obtained.After the normalization,the comprehensive weight of risk factor was obtained,which was regarded as the probability that the intruder selected the vulnerability of private information transmission as the intrusion node.The vulnerability quantitative value was used to evaluate the level of difficulty value of intrusion node.Finally,the parameter of intrusion node threat level was selected,so that the intrusion risk assessment of complex network big data privacy information transmission was achieved.Simulation results show that the proposed method can complete the intrusion risk assessment quickly and accurately.
分 类 号:TP391.41[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.33