The effect evaluation of the network attack based on the fuzzy comprehensive evaluation method

With the rapid development of network technology and the prosperity of all kinds of network application, the attacks of the Internet are very frequent. the cyberspace has become a new battlefield. The network attack became a worldwide research hot spot. The network attack evaluation caused the world...

Full description

Saved in:
Bibliographic Details
Published in2016 3rd International Conference on Systems and Informatics (ICSAI) pp. 367 - 372
Main Authors Ziyan Shi, Guolin Zhao, Jianhao Liu
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.11.2016
Subjects
Online AccessGet full text

Cover

Loading…
Abstract With the rapid development of network technology and the prosperity of all kinds of network application, the attacks of the Internet are very frequent. the cyberspace has become a new battlefield. The network attack became a worldwide research hot spot. The network attack evaluation caused the worldwide attention, and become the cyberspace warfare analysis basis, which provides a basis for the network attack and protection. This paper analyzes the influence the effect of cyberspace. The evaluation criteria system of network attack based on the fuzzy comprehensive evaluation method was presented to promote the study of network attack in this paper. The experiment raised in this paper can prove the method mentioned in this paper.
AbstractList With the rapid development of network technology and the prosperity of all kinds of network application, the attacks of the Internet are very frequent. the cyberspace has become a new battlefield. The network attack became a worldwide research hot spot. The network attack evaluation caused the worldwide attention, and become the cyberspace warfare analysis basis, which provides a basis for the network attack and protection. This paper analyzes the influence the effect of cyberspace. The evaluation criteria system of network attack based on the fuzzy comprehensive evaluation method was presented to promote the study of network attack in this paper. The experiment raised in this paper can prove the method mentioned in this paper.
Author Guolin Zhao
Jianhao Liu
Ziyan Shi
Author_xml – sequence: 1
  surname: Ziyan Shi
  fullname: Ziyan Shi
  organization: Air Force Early-Warning Acad., Wuhan, China
– sequence: 2
  surname: Guolin Zhao
  fullname: Guolin Zhao
  organization: Air Force Early-Warning Acad., Wuhan, China
– sequence: 3
  surname: Jianhao Liu
  fullname: Jianhao Liu
  organization: Air Force Early-Warning Acad., Wuhan, China
BookMark eNpNj71qwzAURlVohybNC7SLXsCuJEeWNAbTH0OgQz0nXEtX2CS2gq2kJE9fl2To9MF34MCZkfs-9EjIM2cp58y8lsX3qkwF43mq9HRocUdmXDLDpBRcPpJN1SBF79FGiifYHyG2oafB0ziBHuNPGHYUYgS7ozWM6OiE_5g_Xi5nakN3GLDBfmxP-N_QYWyCeyIPHvYjLm47J9X7W1V8Juuvj7JYrZPWsJjIHATU3GiHRlrHlfLGMCFxaWu9zEBxtJpLJ6UEPbVkylqVe5GJ3Alt62xOXq7aFhG3h6HtYDhvb8XZL-tgUVU
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICSAI.2016.7810982
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1509055215
9781509055210
EndPage 372
ExternalDocumentID 7810982
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-56a2ab198de95cd177f99025e4cb843a71ec815d555a801637cc76f2326d28cb3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:27 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-56a2ab198de95cd177f99025e4cb843a71ec815d555a801637cc76f2326d28cb3
PageCount 6
ParticipantIDs ieee_primary_7810982
PublicationCentury 2000
PublicationDate 2016-Nov.
PublicationDateYYYYMMDD 2016-11-01
PublicationDate_xml – month: 11
  year: 2016
  text: 2016-Nov.
PublicationDecade 2010
PublicationTitle 2016 3rd International Conference on Systems and Informatics (ICSAI)
PublicationTitleAbbrev ICSAI
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.6442224
Snippet With the rapid development of network technology and the prosperity of all kinds of network application, the attacks of the Internet are very frequent. the...
SourceID ieee
SourceType Publisher
StartPage 367
SubjectTerms Analytical models
Computer crime
Cyberspace
Effect evaluation
Fuzzy comprehensive
Internet
Network attack
Title The effect evaluation of the network attack based on the fuzzy comprehensive evaluation method
URI https://ieeexplore.ieee.org/document/7810982
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA5zTz6pbOKdPPhoul6SNHmU4dgERXDCnhy5FWXQymgf3K_3pNlFxQffSlLSkg_6fen5zjkIXXMpbGx0QpzJDKFKUKJYrIiSlGltlS_K5t0Wj3z8Qu9nbNZBN9tcGOdcaz5zkb9sY_m2Mo3_VTbIRRJLAR_cPTi4hVytTR5MLAeT4fPtxJu1eLS-8UfHlJYwRgfoYfOo4BNZRE2tI7P6VYXxv-9yiPq71Dz8tCWdI9RxZQ-9Atg4ODPwrnw3rgoM8g6XwemNVV0rs8CetyyGaT9XNKvVJ_a-8qV7C1727yuE_tJ9NB3dTYdjsm6cQN5lXBPGVap0Aig4yYxN8ryQPproqNGCZipPnBEJs4wxBQTFs9yYnBegrbhNhdHZMeqWVelOEKYckIy5y4wAHSBB7bECFgbdUfiYWnqKen5r5h-hNMZ8vStnfw-fo30PT0jlu0Ddetm4S-D0Wl-1YH4BcJ-kQw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV3NSgMxEA61HvSk0or_5qDH3e5fssnBg1RL19YiWKEnlySbRSlspe4i7av4Kj6cyWbbqngVvIUNDDvMkPmS-WYGgDNMSeII7lpS-MIKGAkshhxmMRogzhOmm7JptsUAdx-CmxEa1cD7shZGSlmSz6Stl2UuP5mIQj-VtULiOpR4FYWyJ2dv6oL2ehFdKWuee17netjuWtUMAeuZOrmFMPMYVxfrRFIkEjcMU6oTazIQnAQ-C10piIsShBBTZzX2QyFCnCqYgROPCO4rsWtgXcEM5JnisEXhjUNbUfv-MtLsMGxXf_ZtREsZoTpb4GOhmyGmjO0i57aY_2j7-E-V3wbNVekhvFsG1R1Qk1kDPCpnhoZ5AlftyeEkhQq-wsww2SHLcybGUMflBKptvZcW8_kMat78VD4Zrv5XCWZ-dhMM_0KvXVDPJpncAzDAylMdLH1BFM6hCs2iVAlWuCrVOUNvHzS0JeIX0_ojroxw8PvnU7DRHd7243406B2CTe0ZpmzxCNTzaSGPFX7J-UnpRxDEf2y6T6yA_-g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+3rd+International+Conference+on+Systems+and+Informatics+%28ICSAI%29&rft.atitle=The+effect+evaluation+of+the+network+attack+based+on+the+fuzzy+comprehensive+evaluation+method&rft.au=Ziyan+Shi&rft.au=Guolin+Zhao&rft.au=Jianhao+Liu&rft.date=2016-11-01&rft.pub=IEEE&rft.spage=367&rft.epage=372&rft_id=info:doi/10.1109%2FICSAI.2016.7810982&rft.externalDocID=7810982