The effect evaluation of the network attack based on the fuzzy comprehensive evaluation method
With the rapid development of network technology and the prosperity of all kinds of network application, the attacks of the Internet are very frequent. the cyberspace has become a new battlefield. The network attack became a worldwide research hot spot. The network attack evaluation caused the world...
Saved in:
Published in | 2016 3rd International Conference on Systems and Informatics (ICSAI) pp. 367 - 372 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.11.2016
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | With the rapid development of network technology and the prosperity of all kinds of network application, the attacks of the Internet are very frequent. the cyberspace has become a new battlefield. The network attack became a worldwide research hot spot. The network attack evaluation caused the worldwide attention, and become the cyberspace warfare analysis basis, which provides a basis for the network attack and protection. This paper analyzes the influence the effect of cyberspace. The evaluation criteria system of network attack based on the fuzzy comprehensive evaluation method was presented to promote the study of network attack in this paper. The experiment raised in this paper can prove the method mentioned in this paper. |
---|---|
AbstractList | With the rapid development of network technology and the prosperity of all kinds of network application, the attacks of the Internet are very frequent. the cyberspace has become a new battlefield. The network attack became a worldwide research hot spot. The network attack evaluation caused the worldwide attention, and become the cyberspace warfare analysis basis, which provides a basis for the network attack and protection. This paper analyzes the influence the effect of cyberspace. The evaluation criteria system of network attack based on the fuzzy comprehensive evaluation method was presented to promote the study of network attack in this paper. The experiment raised in this paper can prove the method mentioned in this paper. |
Author | Guolin Zhao Jianhao Liu Ziyan Shi |
Author_xml | – sequence: 1 surname: Ziyan Shi fullname: Ziyan Shi organization: Air Force Early-Warning Acad., Wuhan, China – sequence: 2 surname: Guolin Zhao fullname: Guolin Zhao organization: Air Force Early-Warning Acad., Wuhan, China – sequence: 3 surname: Jianhao Liu fullname: Jianhao Liu organization: Air Force Early-Warning Acad., Wuhan, China |
BookMark | eNpNj71qwzAURlVohybNC7SLXsCuJEeWNAbTH0OgQz0nXEtX2CS2gq2kJE9fl2To9MF34MCZkfs-9EjIM2cp58y8lsX3qkwF43mq9HRocUdmXDLDpBRcPpJN1SBF79FGiifYHyG2oafB0ziBHuNPGHYUYgS7ozWM6OiE_5g_Xi5nakN3GLDBfmxP-N_QYWyCeyIPHvYjLm47J9X7W1V8Juuvj7JYrZPWsJjIHATU3GiHRlrHlfLGMCFxaWu9zEBxtJpLJ6UEPbVkylqVe5GJ3Alt62xOXq7aFhG3h6HtYDhvb8XZL-tgUVU |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICSAI.2016.7810982 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1509055215 9781509055210 |
EndPage | 372 |
ExternalDocumentID | 7810982 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i90t-56a2ab198de95cd177f99025e4cb843a71ec815d555a801637cc76f2326d28cb3 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:38:27 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-56a2ab198de95cd177f99025e4cb843a71ec815d555a801637cc76f2326d28cb3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_7810982 |
PublicationCentury | 2000 |
PublicationDate | 2016-Nov. |
PublicationDateYYYYMMDD | 2016-11-01 |
PublicationDate_xml | – month: 11 year: 2016 text: 2016-Nov. |
PublicationDecade | 2010 |
PublicationTitle | 2016 3rd International Conference on Systems and Informatics (ICSAI) |
PublicationTitleAbbrev | ICSAI |
PublicationYear | 2016 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.6442224 |
Snippet | With the rapid development of network technology and the prosperity of all kinds of network application, the attacks of the Internet are very frequent. the... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 367 |
SubjectTerms | Analytical models Computer crime Cyberspace Effect evaluation Fuzzy comprehensive Internet Network attack |
Title | The effect evaluation of the network attack based on the fuzzy comprehensive evaluation method |
URI | https://ieeexplore.ieee.org/document/7810982 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA5zTz6pbOKdPPhoul6SNHmU4dgERXDCnhy5FWXQymgf3K_3pNlFxQffSlLSkg_6fen5zjkIXXMpbGx0QpzJDKFKUKJYrIiSlGltlS_K5t0Wj3z8Qu9nbNZBN9tcGOdcaz5zkb9sY_m2Mo3_VTbIRRJLAR_cPTi4hVytTR5MLAeT4fPtxJu1eLS-8UfHlJYwRgfoYfOo4BNZRE2tI7P6VYXxv-9yiPq71Dz8tCWdI9RxZQ-9Atg4ODPwrnw3rgoM8g6XwemNVV0rs8CetyyGaT9XNKvVJ_a-8qV7C1727yuE_tJ9NB3dTYdjsm6cQN5lXBPGVap0Aig4yYxN8ryQPproqNGCZipPnBEJs4wxBQTFs9yYnBegrbhNhdHZMeqWVelOEKYckIy5y4wAHSBB7bECFgbdUfiYWnqKen5r5h-hNMZ8vStnfw-fo30PT0jlu0Ddetm4S-D0Wl-1YH4BcJ-kQw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV3NSgMxEA61HvSk0or_5qDH3e5fssnBg1RL19YiWKEnlySbRSlspe4i7av4Kj6cyWbbqngVvIUNDDvMkPmS-WYGgDNMSeII7lpS-MIKGAkshhxmMRogzhOmm7JptsUAdx-CmxEa1cD7shZGSlmSz6Stl2UuP5mIQj-VtULiOpR4FYWyJ2dv6oL2ehFdKWuee17netjuWtUMAeuZOrmFMPMYVxfrRFIkEjcMU6oTazIQnAQ-C10piIsShBBTZzX2QyFCnCqYgROPCO4rsWtgXcEM5JnisEXhjUNbUfv-MtLsMGxXf_ZtREsZoTpb4GOhmyGmjO0i57aY_2j7-E-V3wbNVekhvFsG1R1Qk1kDPCpnhoZ5AlftyeEkhQq-wsww2SHLcybGUMflBKptvZcW8_kMat78VD4Zrv5XCWZ-dhMM_0KvXVDPJpncAzDAylMdLH1BFM6hCs2iVAlWuCrVOUNvHzS0JeIX0_ojroxw8PvnU7DRHd7243406B2CTe0ZpmzxCNTzaSGPFX7J-UnpRxDEf2y6T6yA_-g |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+3rd+International+Conference+on+Systems+and+Informatics+%28ICSAI%29&rft.atitle=The+effect+evaluation+of+the+network+attack+based+on+the+fuzzy+comprehensive+evaluation+method&rft.au=Ziyan+Shi&rft.au=Guolin+Zhao&rft.au=Jianhao+Liu&rft.date=2016-11-01&rft.pub=IEEE&rft.spage=367&rft.epage=372&rft_id=info:doi/10.1109%2FICSAI.2016.7810982&rft.externalDocID=7810982 |