Evaluation of the Attack Effect Based on Improved Grey Clustering Model

Evaluation of the Attack Effect Based on Improved Grey Clustering Model

Chen Yue, Lu Tianliang, Cai Manchun, Li Jingying
Copyright: © 2018 |Pages: 9
DOI: 10.4018/IJDCF.2018010108
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

There are a lot of uncertainties and incomplete information problems on network attack. It is of great value to access the effect of the attack in the current network attack and defense. This paper examines the characteristics of network attacks, there are problems with traditional clustering that index attribution is not clear and the cross of clustering interval. A two-stage grey synthetic clustering evaluation model based on center-point triangular whitenization weight function was proposed for the attack effect. The authors studied the feasibility of applying this model to the evaluation of network attack effect. Finally, an example is given, which showed the model could evaluate the effect of the denial-of-service attack precisely. It is also shown that the model is viable to evaluate the attack effect.
Article Preview
Top

2.1. Research on Network Attack Effect

The main research method of network attack effect evaluation is to evaluate the network attack effect through the designed model. Wang, Xian, and Wang (2005) presented a network effect evaluation model based on network entropy, which is based on the concept of entropy in information theory. In order to solve the problem of inaccurate data of some evaluation indexes, Cao, Zhang, and Wu (2009) proposed a network attack effect evaluation system based on fuzzy set, which makes the results more reasonable and effective. Wang, Jiang, and Xian (2009) proposed a method based on the attribute importance of rough set to reduce the subjectivity in the process of determining the weight of evaluation index. There is research work related to the effects of specific network attacks, such as denial of service attack and other evaluation methods (Wang, 2013) (Li, Zhang, & Zhu, 2015).

2.2. Research on Grey Theory

Grey theory is a kind of method to study the problem which has a little and uncertain information (Liu, 2014). Wang (2012) evaluated teachers’ professional ability based on grey absolute degree to decide the rank of the teachers’ professional training. Zhao, Zheng, and Zhao (2012) proposed an evaluation mode of the 3G network attack effectiveness based on AHP and grey relational analysis and use grey correlation analysis method to reduce the subjective effects brought by the AHP. Gao, Xu, and Wang (2011) used grey clustering to build a hierarchical network security evaluation system for power enterprises, and divided the network attacks into different levels through clustering. The evaluation system improved the display capabilities of the network security situation, and solved the human disturbance problem existed in the original system. Zhao (2013) presented a network protection capability evaluation model from information protection and defense to analyze the ability of target network protection. The application of grey theory provides an effective way to solve this kind of problem in view of the characteristic of the large amount of uncertainty in the network attack.

Top

3. Grey Clustering Evaluation Model

3.1. Concept of Grey Clustering

Grey clustering refers to divide the index into some interval according to the whitenization weight function, and the researchers judge the index belonging to what kind of grey class by calculating the kinds of index data, and finally determine the definition of the classification.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing