Title
Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation -M(1, 2, 3).
Abstract
Abstract—Network security has close relationships with the physical environment of information carriers, information transmission, information storage, information management and so on, and these relations have much ambiguity. Therefore, it is reasonable and scientific to apply fuzzy comprehensive evaluation method for network security fuzzy evaluation. The core of network security fuzzy evaluation is membership degree transformation calculation. But the transformation methods should be discussed, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy ,to mine knowledge information about object classification hidden in every index, affirm the relationship of object classification and index membership, eliminate the redundant data in index membership for object classification by defining distinguishable weight and extract valid values to compute object membership. The new algorithm of membership degree transformation includes three calculation steps which can be summarized as “effective, comparison and composition”, which is denoted as M(1,2,3). The paper applied the new algorithm in network security fuzzy
Year
DOI
Venue
2009
null
Journal of Networks
Keywords
Field
DocType
fuzzy evaluation,m(1,2,3) model,membership degree transformation,network security,data mining,indexation,information management
Data mining,Information management,Fuzzy classification,Defuzzification,Computer science,Fuzzy logic,Network security,Algorithm,Fuzzy set,Fuzzy number,Membership function
Journal
Volume
Issue
Citations 
4
5
5
PageRank 
References 
Authors
0.81
2
2
Name
Order
Citations
PageRank
Hua Jiang1145.42
Junhu Ruan2314.45