Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author Iformato Egeerg Departmet, Luzhou Ralway Vocatoal Techcal College, LuZhou, 545007, Cha, E-mal:13977298896@139.com Abstract Wth the rapd developmet of computer ad commucato techology, the computer etwork throughout people whole lve, cocer govermet, factory, school, commucato, bak, mltary ad the other world, as the people daly lfe, as bg s as slghtly stable as the atoal securty. It ca t be avod problem how to desg a etwork topology structure of hgh capacty, low cost, easy expaso to every etwork maagers. The key of computer commucato etwork topology structure s the plag desg of back-boe etwork topology structure, durg the back-boe etwork desgg the key gudele s all-termal etwork relable capacty. It s the best techology gudele to embody back-boe etwork relable capacty. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss s the multple attrbute decso makg (MADM) problems. I ths paper, we vestgate the multple attrbute decso makg (MADM) problems for evaluatg the computer commucato etwork securty. The, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. Fally, a llustratve example demostrates the practcalty ad effectveess of the proposed method. Keywords: Multple Attrbute Decso Makg (MADM), Computer Commucato Network, Grey Relatoal Aalyss (GRA), Relatoal Degree 1. Itroducto So far, there was ot a ormal ad tegrated rsk assessmet system for computer etwork formato securty, ad also, the opo of sortg rsk assessmet dd t come to a agreemet. Sce absece of rsk assessmet stadard, dfferet rsk assessmet departmet got the dfferet result evaluatg the same system. At the same tme, wth speedg up orgazato formato process ad ehacg the foudato ad teger of etwork formato system, formato securty problem became more ad more mportat. Curret formato securty eeded to stregthe the rsk assessmet quckly. The exsted research areas cluded securty costructo ad developmet for computer etwork system, rule ad method of etwork formato securty rsk assessmet. Wth aalyzg the curret stuato of computer formato system, the key pots ad problems of rsk assessmet could be foud to provde the referece ad bass for etwork securty orgazato. Because may formato system securty rsk assessmet theores were hard to be operated, regularty uo rsk assessmet was desged ad mplemeted to mprove the maeuverablty, acheved qualtatve ad measurable rsk aalyss, at the same tme, aalyzed ad dscussed developmet aspect of etwork formato securty rsk assessmet. Wth the developmet of the Iformato Techology, computer etworks have bee wdely used may felds. But people are axous for the securty of the computer etworks more ad more. Recet years, more tha 60% user etworks have bee broke. The computer etworks have the great rsk. The desre of the etworks for dfferet type of users s dfferet. The etwork egeers usually costruct a computer etwork accordg to ther experece ad the requests of the user. Qualtatve aalyss of the securty for a etwork s ofte used. Wth the rapd developmet of formato techology, the teret has already become the vtal vehcle for formato dssemato globally. However, sce after the advet of the teret, resource sharg ad formato securty have tur to oe par of rrecoclable cotradctos. The more ad the wder teret formato s shared, the more ad the deeper Iteratoal Joural of Dgtal Cotet Techology ad ts Applcatos(JDCTA) Volume6,Number22,December 2012 do:10.4156/jdcta.vol6.ssue22.48 417
Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J formato securty problems are creasgly exposured. Therefore, tradtoal passve protecto s ot adaptable to the curret securty stuato, ad the theory of proactve etwork securty assessmet has bee created accordgly. The favorable etwork securty assessmet ca assst the maagemet staff to comprehesvely ad precsely cotrol the level of securty, ths makes a great mportace to safeguard the teret to ru smoothly[1-10]. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss are the multple attrbute decso makg (MADM) problems.the am of ths paper s to vestgate the MADM problems for evaluatg the computer commucato etwork securty based o grey relatoal aalyss. The, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. I order to do so, the rest of the paper s orgazed as follows: ext secto brefly troduce some basc cocepts related to the grey relatoal aalyss (GRA) model. I Secto 3, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. I Secto 4 we llustrate our proposed algorthmc method wth a example. The fal secto cocludes. 2. Grey relatoal aalyss Grey relatoal aalyss (GRA) method [11-12] was orgally developed by Deg ad has bee successfully appled solvg a varety of MADM problems [13-21]. The ma procedure of GRA s frstly traslatg the performace of all alteratves to a comparablty sequece. Ths step s called grey relatoal geeratg. Accordg to these sequeces, a deal target sequece s defed. The, the grey relatoal coeffcet betwee all comparablty sequeces ad deal target sequece s calculated. Fally, base o these grey relatoal coeffcets, the grey relatoal degree betwee deal target sequece ad every comparablty sequeces s calculated. If a comparablty sequece traslated from a alteratve has the hghest grey relatoal degree betwee the deal target sequece ad tself, that alteratve wll be the best choce. The procedures of grey relatoal aalyss are show Fg. 1 [11-12]. Fgure 1. Procedure of grey relatoal aalyss 418
Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J 3. Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Wth the cotuous developmet of computer techology ad the wde spread of etwork applcato, etwork securty s becomg a mportat ssue whch techcas face ad may studes relatg to the etwork securty techology are becomg mature. Network securty stuatoal awareess s a techology whch ca realze the etwork securty specto ad motorg. Besdes, t s a hot topc o the formato securty research. It s very sgfcat to carry out ths research, for t ca mprove the emergecy respose ablty of et system, mtgate the harm caused by cyber attacks, dscover the malcous vaso behavor ad mprove the system s couter-attack ablty. I ths secto, we cosder a multple attrbute decso makg problems to evaluate the computer commucato etwork securty based o grey relatoal aalyss. Let A A1, A2,, Am dscrete set of alteratves, ad G G G G be the set of attrbutes,,,, 1 2 s the weghtg vector of the attrbutesgj j1, 2,,, where j 0,1, j1 that A aj s the decso matrx, where j m be a 1, 2,, 1 j. Suppose a s a preferece value, gve by the decso maker for the alteratve A A wth respect to the attrbutegj G. I the followg, we wll exted the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Step 1. Calculate the ormalzed decso matrx. The ormalzed value b j s calculated as If attrbute G j s a beeft crtero: b j aj m aj max a m a j j, 1, 2,, m, j 1, 2,,. (1) If attrbute G j s a cost crtero: b j max aj aj max a m a j j, 1, 2,, m, j 1, 2,,. (2) Step 2. Determe the postve deal soluto ad egatve deal soluto,, 1 max b j B b b,, 1 m b j B b b (3) (4) Step 3. Calculate the grey relatoal coeffcet of each alteratve from PIS ad NIS usg the followg equato, respectvely: The grey relatoal coeffcet of each alteratve from PIS s gve as 419
Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J j m m b b max max b b b b max max b b 1 m 1j j j 1 m 1j j j j j 1 m 1j j j, 1, 2,, m, j1, 2,,. (5) Smlarly, the grey relatoal coeffcet of each alteratve from NIS s gve as m m b b max max b b j b b max max b b 1 m 1j j j 1 m 1j j j j j 1 m 1j j j, 1, 2,, m, j1, 2,,. (6) where the detfcato coeffcet 0.5. Step 4. Calculatg the degree of grey relatoal coeffcet of each alteratve from PIS ad NIS usg the followg equato, respectvely: jj j1 w, 1,2,, m. (7) jj j1 w, 1,2,, m. (8) The basc prcple of the GRA method s that the chose alteratve should have the largest degree of grey relato from the postve deal soluto ad the smallest degree of grey relato from the egatve deal soluto. Step 5. Calculatg the relatve relatoal degree of each alteratve from PIS usg the followg equato, Step 6. Rak all the alteratves A 1, 2,, m 1, 2,, m. If ay alteratve has the hghest alteratve. Step 7. Ed. 4. Numercal example, 1,2,, m. (9) ad select the best oe(s) accordace wth value, the, t s the most mportat The calculator techque develops quckly ad makes owadays the socal developmet have already caed ot got away from a formato etwork. Because the calculator etwork delvers of volve each realm of face, scece educato, ad mltary...etc. the formato, clude huge ecoomy or atoal terest amog them, so ecessary etwork from each sde of everyoe attack stoes, the etwork attack stoes of the mafestato s also vared, lke vrus fecto, steal the dstortg of data, formato delete to add a etc.. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss s the multple attrbute decso makg (MADM) problems. I ths secto, we preset a emprcal case study of evaluatg the computer commucato etwork securty based o grey relatoal aalyss. The am s to evaluate the best eterprse from evaluatg the computer commucato etwork securty. The fve possble computer commucato etwork systems A 1, 2,3, 4,5 are evaluated. The expert groups must take a decso accordg to the followg sx attrbutes: G1 s the flmsess of the etwork; G2 s the 420
Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J etwork safety of etwork formato safety; G3 s the famlar etwork attack the method ad couter pla; G4 s the etwork safety costructo; G5 s the etwork safety techology; G6 s the etwork safety strategy. The fve possble computer commucato etwork systems A 1, 2,3, 4,5 are to be evaluated by the decso makers uder the above sx attrbutes (whose weghtg vector 0.12,0.20,0.15,0.18,0.21,0.14 T ) usg the 0-10 scale, ad costruct the A a j : decso matrx as follows 5 6 A1 7 5 7 8 7 5 A 2 4 3 9 6 8 4 A A 3 5 9 4 5 5 7 A4 9 6 5 4 6 6 A 5 7 8 8 9 8 3 To get the most desrable computer commucato etwork systems, the followg steps are volved: Step 1. Costructg the ormalzed decso matrx as B by usg formula (1) ad (2): Step 2. Determg the PIS ad the NIS G1 G2 G3 G4 G5 G6 A1 0.60 0.33 0.60 0.80 0.67 0.50 A2 0.00 0.00 1.00 0.40 1.00 0.25 A A 3 0.20 1.00 0.00 0.20 0.00 1.00 A4 1.00 0.50 0.20 0.00 0.33 0.75 A 5 0.60 0.83 0.80 1.00 1.00 0.00 B 1.00 1.00 1.00 1.00 1.00 1.00 B 0.00 0.00 0.00 0.00 0.00 0.00 Step 3. Calculatg the grey relatoal coeffcet of each computer commucato etwork system from PIS ad NIS 5 6 j 0.5556 0.4286 0.5556 0.7143 0.6000 0.5000 0.3333 0.3333 1.0000 0.4545 1.0000 0.4000 0.3846 1.0000 0.3333 0.3846 0.3333 1.0000 1.0000 0.5000 0.3846 0.3333 0.4286 0.6667 0.5556 0.7500 0.7143 1.0000 1.0000 0.3333 421
Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J 5 6 j 0.4545 0.6000 0.4545 0.3846 0.4286 0.5000 1.0000 1.0000 0.3333 0.5556 0.3333 0.6667 0.7143 0.3333 1.0000 0.7143 1.0000 0.3333 0.3333 0.5000 0.7143 1.0000 0.6000 0.4000 0.4545 0.3750 0.3846 0.3333 0.3333 1.0000 Step 4. Calculatg the degree of grey relatoal coeffcet of each computer commucato etwork system from PIS ad NIS 0.5603, 0.6045, 0.5754, 0.5210, 0.7605 1 2 3 4 5 0.4720, 0.6333, 0.6876, 0.60901, 0.4572 1 2 3 4 5 Step 5. Calculate the relatve relatoal degree of each computer commucato etwork system from PIS 0.5428, 0.4883, 0.4556, 0.4610, 0.6245 1 2 3 4 5 Step 6. Accordg to the relatve relatoal degree, the rakg order of the fve computer commucato etwork systems s: A5 A1 A2 A4 A3, ad thus the most desrable computer commucato etwork system s A 5. 5. Cocluso Computer techology s developg very rapdly, powerful computers ad Itraet/Iteret are becomg popular all over the world. Iformatolzato ad etworklzato become tedecy of today s ecoomc ad socety s developmet of the world. Iformato techology ad computer etwork have already appled wdely. Wth the rapd developmet of computer ad commucato techology, the computer etwork throughout people whole lve, cocer govermet, factory, school, commucato, bak, mltary ad the other world, as the people daly lfe, as bg s as slghtly stable as the atoal securty. It ca t be avod problem how to desg a etwork topology structure of hgh capacty, low cost, easy expaso to every etwork maagers. The key of computer commucato etwork topology structure s the plag desg of back-boe etwork topology structure, durg the back-boe etwork desgg the key gudele s all-termal etwork relable capacty. It s the best techology gudele to embody back-boe etwork relable capacty. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss s the multple attrbute decso makg (MADM) problems. I ths paper, we vestgate the multple attrbute decso makg (MADM) problems for evaluatg the computer commucato etwork securty. The, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. Fally, a llustratve example demostrates the practcalty ad effectveess of the proposed method. 6. Refereces [1] ZANG Wehua, GUO Ru, "The Applcato of Neural Network based o Evolutoary Strategy 422
Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Network Securty Quatfcato Aalyss", AISS: Advaces Iformato Sceces ad Servce Sceces, Vol. 4, No. 2, pp. 151-159, 2012. [2] Je Zhag, Ju Tag, Fag Pe, "A method for etwork securty rsk assessmet ad decsomakg based o the cloud model", JCIT: Joural of Covergece Iformato Techology, Vol. 7, No. 6, pp. 146-153, 2012. [3] Ja Wu, "A Approach to Evaluatg the Computer Network Securty wth Ucerta Lgustc Iformato", JDCTA: Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 6, No. 5, pp. 174-180, 2012. [4] Lao Hu-fe, "The Research o Network Securty Detecto Based o Improved Geetc Neural Algorthm", AISS: Advaces Iformato Sceces ad Servce Sceces, Vol. 4, No. 13, pp. 69-75, 2012. [5] ChuaA Wag, Yaju Wag, Hua Ge, "Itellgece Computg Strategy for Computer Network Securty Itruso Detecto", JDCTA: Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 6, No. 13, pp. 217-225, 2012. [6] Xuchag L, "Model for Evaluatg the Computer Network Securty Ucerta Lgustc Evromet", IJACT, Vol. 4, No. 4, pp. 93-99, 2012. [7] Yupg L, Jgyua Y, Guoqag Wu, "Model for Evaluatg the Computer Network Securty wth Iterval-Valued Itutostc Fuzzy Iformato", JDCTA: Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 6, No. 6, pp. 140-146, 2012. [8] Yupg L, Xja Sha, Guoqag Wu, "Comprehesve Evaluato Model for Computer Network Securty wth Lgustc Iformato", AISS: Advaces Iformato Sceces ad Servce Sceces, Vol. 3, No. 9, pp. 126-131, 2011. [9] Yua Jag, Dogmg Jag, "A Approach to Wreless Sesor Network Securty Assessmet wth Fuzzy Number Itutostc Fuzzy Iformato", AISS: Advaces Iformato Sceces ad Servce Sceces,Vol. 3, No. 9, pp. 140-146, 2011. [10] Xagya Tao, Chagyu Ja, Cheg Yag, "Securty Aalyss o Cha Campus Network ad Costructo o Network Securty System", JCIT: Joural of Covergece Iformato Techology, Vol. 6, No. 11, pp. 166-174, 2011. [11] Julog Deg, Itroducto to Grey System, The Joural of Grey System (UK), vol.1, o.1, pp.1-24, 1989. [12] Julog Deg, Grey System Theory, Wuha: press of Huazhog Uversty of Scece & Techology, Cha, 2002. [13] Desheg Wu, Suppler selecto a fuzzy group decso makg settg: A method usg grey related aalyss ad Dempster-Shafer theory, Expert Systems wth Applcatos, vol.36, o.2, pp. 8892-8899, 2009. [14] Guwu We, GRA method for multple attrbute decso makg wth complete weght formato tutostc fuzzy settg, Kowledge-Based Systems, Vol.23, No.3, pp.243-247, 2010. [15] Guwu We, Grey relatoal aalyss model for dyamc hybrd multple attrbute decso makg, Kowledge-based Systems, vol.24, o.5, pp. 672-679, 2011. [16] Guwu We, Grey relatoal aalyss method for 2-tuple lgustc multple attrbute group decso makg wth complete weght formato, Expert Systems wth Applcatos, vol.38. o.5, pp. 4824-4828, 2011. [17] Yaoguo Dag, Sfeg Lu, B Lu, Study o cdece decso makg model of mult-attrbute terval umber, Joural of Najg Uversty of aeroautcs & astroautcs, vol. 36, o.3, pp. 403-406, 2004. [18] Jju Zhag, Desheg Wu, D. L. Olso, The method of grey related aalyss to multple attrbute decso makg problems wth terval umbers, Mathematcal ad Computer Modellg, vol. 42, o.3, pp.991-998, 2005. [19] Pede Lu, A ovel method for hybrd multple attrbute decso makg, Kowledge-Based Systems, vol. 22, o.5, pp.388-391, 2009. [20] D. L. Olso, D. Wu, Smulato of fuzzy multattrbute models for grey relatoshps, Europea Joural of Operatoal Research, vol. 175, o.4, pp.111-120, 2006. [21] Y. Kuo, T. Yag, G.W. Huag, The use of grey relatoal aalyss solvg multple attrbute decso-makg problems, Computers & Idustral Egeerg, vol. 55, o.1, pp. 80-93, 2008. 423