Network Security Risk Assessment Based on Item Response Theory

Owing to the traditional risk assessment method has one-sidedness and is difficult to reflect the real network situation, a risk assessment method based on Item Response Theory (IRT) is put forward in network security. First of all, the novel algorithms of calculating the threat of attack and the su...

Full description

Bibliographic Details
Main Authors: Fangwei Li, Qing Huang, Jiang Zhu, Zhuxun Peng
Format: Article
Language:English
Published: European Alliance for Innovation (EAI) 2015-08-01
Series:EAI Endorsed Transactions on Security and Safety
Subjects:
Online Access:http://eudl.eu/doi/10.4108/icst.mobimedia.2015.259024
_version_ 1818107528936947712
author Fangwei Li
Qing Huang
Jiang Zhu
Zhuxun Peng
author_facet Fangwei Li
Qing Huang
Jiang Zhu
Zhuxun Peng
author_sort Fangwei Li
collection DOAJ
description Owing to the traditional risk assessment method has one-sidedness and is difficult to reflect the real network situation, a risk assessment method based on Item Response Theory (IRT) is put forward in network security. First of all, the novel algorithms of calculating the threat of attack and the successful probability of attack are proposed by the combination of IRT model and Service Security Level. Secondly, the service weight of importance is calculated by the three-demarcation analytic hierarchy process. Finally, the risk situation graph of service, host and network logic layer could be generated by the improved method. The simulation results show that this method can be more comprehensive consideration of factors which are affecting network security, and a more realistic network risk situation graph in real-time will be obtained.
first_indexed 2024-12-11T02:00:54Z
format Article
id doaj.art-b83688552a794b8fb42e366439654500
institution Directory Open Access Journal
issn 2032-9393
language English
last_indexed 2024-12-11T02:00:54Z
publishDate 2015-08-01
publisher European Alliance for Innovation (EAI)
record_format Article
series EAI Endorsed Transactions on Security and Safety
spelling doaj.art-b83688552a794b8fb42e3664396545002022-12-22T01:24:29ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Security and Safety2032-93932015-08-01251610.4108/icst.mobimedia.2015.259024Network Security Risk Assessment Based on Item Response TheoryFangwei Li0Qing Huang1Jiang Zhu2Zhuxun Peng3Chongqing University of Posts Telecommunications, Chongqing Key Lab of Mobile Communications TechnologyChongqing University of Posts Telecommunications, Chongqing Key Lab of Mobile Communications Technology; huangq46@163.comChongqing University of Posts Telecommunications, Chongqing Key Lab of Mobile Communications TechnologyChongqing University of Posts Telecommunications, Chongqing Key Lab of Mobile Communications TechnologyOwing to the traditional risk assessment method has one-sidedness and is difficult to reflect the real network situation, a risk assessment method based on Item Response Theory (IRT) is put forward in network security. First of all, the novel algorithms of calculating the threat of attack and the successful probability of attack are proposed by the combination of IRT model and Service Security Level. Secondly, the service weight of importance is calculated by the three-demarcation analytic hierarchy process. Finally, the risk situation graph of service, host and network logic layer could be generated by the improved method. The simulation results show that this method can be more comprehensive consideration of factors which are affecting network security, and a more realistic network risk situation graph in real-time will be obtained.http://eudl.eu/doi/10.4108/icst.mobimedia.2015.259024irthierarchical modelrisk assessmentnetwork security
spellingShingle Fangwei Li
Qing Huang
Jiang Zhu
Zhuxun Peng
Network Security Risk Assessment Based on Item Response Theory
EAI Endorsed Transactions on Security and Safety
irt
hierarchical model
risk assessment
network security
title Network Security Risk Assessment Based on Item Response Theory
title_full Network Security Risk Assessment Based on Item Response Theory
title_fullStr Network Security Risk Assessment Based on Item Response Theory
title_full_unstemmed Network Security Risk Assessment Based on Item Response Theory
title_short Network Security Risk Assessment Based on Item Response Theory
title_sort network security risk assessment based on item response theory
topic irt
hierarchical model
risk assessment
network security
url http://eudl.eu/doi/10.4108/icst.mobimedia.2015.259024
work_keys_str_mv AT fangweili networksecurityriskassessmentbasedonitemresponsetheory
AT qinghuang networksecurityriskassessmentbasedonitemresponsetheory
AT jiangzhu networksecurityriskassessmentbasedonitemresponsetheory
AT zhuxunpeng networksecurityriskassessmentbasedonitemresponsetheory