Network Security Risk Assessment Based on Item Response Theory
Owing to the traditional risk assessment method has one-sidedness and is difficult to reflect the real network situation, a risk assessment method based on Item Response Theory (IRT) is put forward in network security. First of all, the novel algorithms of calculating the threat of attack and the su...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
European Alliance for Innovation (EAI)
2015-08-01
|
Series: | EAI Endorsed Transactions on Security and Safety |
Subjects: | |
Online Access: | http://eudl.eu/doi/10.4108/icst.mobimedia.2015.259024 |
_version_ | 1818107528936947712 |
---|---|
author | Fangwei Li Qing Huang Jiang Zhu Zhuxun Peng |
author_facet | Fangwei Li Qing Huang Jiang Zhu Zhuxun Peng |
author_sort | Fangwei Li |
collection | DOAJ |
description | Owing to the traditional risk assessment method has one-sidedness and is difficult to reflect the real network situation, a risk assessment method based on Item Response Theory (IRT) is put forward in network security. First of all, the novel algorithms of calculating the threat of attack and the successful probability of attack are proposed by the combination of IRT model and Service Security Level. Secondly, the service weight of importance is calculated by the three-demarcation analytic hierarchy process. Finally, the risk situation graph of service, host and network logic layer could be generated by the improved method. The simulation results show that this method can be more comprehensive consideration of factors which are affecting network security, and a more realistic network risk situation graph in real-time will be obtained. |
first_indexed | 2024-12-11T02:00:54Z |
format | Article |
id | doaj.art-b83688552a794b8fb42e366439654500 |
institution | Directory Open Access Journal |
issn | 2032-9393 |
language | English |
last_indexed | 2024-12-11T02:00:54Z |
publishDate | 2015-08-01 |
publisher | European Alliance for Innovation (EAI) |
record_format | Article |
series | EAI Endorsed Transactions on Security and Safety |
spelling | doaj.art-b83688552a794b8fb42e3664396545002022-12-22T01:24:29ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Security and Safety2032-93932015-08-01251610.4108/icst.mobimedia.2015.259024Network Security Risk Assessment Based on Item Response TheoryFangwei Li0Qing Huang1Jiang Zhu2Zhuxun Peng3Chongqing University of Posts Telecommunications, Chongqing Key Lab of Mobile Communications TechnologyChongqing University of Posts Telecommunications, Chongqing Key Lab of Mobile Communications Technology; huangq46@163.comChongqing University of Posts Telecommunications, Chongqing Key Lab of Mobile Communications TechnologyChongqing University of Posts Telecommunications, Chongqing Key Lab of Mobile Communications TechnologyOwing to the traditional risk assessment method has one-sidedness and is difficult to reflect the real network situation, a risk assessment method based on Item Response Theory (IRT) is put forward in network security. First of all, the novel algorithms of calculating the threat of attack and the successful probability of attack are proposed by the combination of IRT model and Service Security Level. Secondly, the service weight of importance is calculated by the three-demarcation analytic hierarchy process. Finally, the risk situation graph of service, host and network logic layer could be generated by the improved method. The simulation results show that this method can be more comprehensive consideration of factors which are affecting network security, and a more realistic network risk situation graph in real-time will be obtained.http://eudl.eu/doi/10.4108/icst.mobimedia.2015.259024irthierarchical modelrisk assessmentnetwork security |
spellingShingle | Fangwei Li Qing Huang Jiang Zhu Zhuxun Peng Network Security Risk Assessment Based on Item Response Theory EAI Endorsed Transactions on Security and Safety irt hierarchical model risk assessment network security |
title | Network Security Risk Assessment Based on Item Response Theory |
title_full | Network Security Risk Assessment Based on Item Response Theory |
title_fullStr | Network Security Risk Assessment Based on Item Response Theory |
title_full_unstemmed | Network Security Risk Assessment Based on Item Response Theory |
title_short | Network Security Risk Assessment Based on Item Response Theory |
title_sort | network security risk assessment based on item response theory |
topic | irt hierarchical model risk assessment network security |
url | http://eudl.eu/doi/10.4108/icst.mobimedia.2015.259024 |
work_keys_str_mv | AT fangweili networksecurityriskassessmentbasedonitemresponsetheory AT qinghuang networksecurityriskassessmentbasedonitemresponsetheory AT jiangzhu networksecurityriskassessmentbasedonitemresponsetheory AT zhuxunpeng networksecurityriskassessmentbasedonitemresponsetheory |