Network Security Risk Assessment Based on Item Response Theory

Li, Fangwei and Huang, Qing and Zhu, Jiang and Peng, Zhuxun (2015) Network Security Risk Assessment Based on Item Response Theory. EAI Endorsed Transactions on Security and Safety, 2 (5). e5. ISSN 2032-9393

[thumbnail of icst.mobimedia.2015.259024.pdf]
Available under License Creative Commons Attribution No Derivatives.

Download (353kB) | Preview


Owing to the traditional risk assessment method has one-sidedness and is difficult to reflect the real network situation, a risk assessment method based on Item Response Theory (IRT) is put forward in network security. First of all, the novel algorithms of calculating the threat of attack and the successful probability of attack are proposed by the combination of IRT model and Service Security Level. Secondly, the service weight of importance is calculated by the three-demarcation analytic hierarchy process. Finally, the risk situation graph of service, host and network logic layer could be generated by the improved method. The simulation results show that this method can be more comprehensive consideration of factors which are affecting network security, and a more realistic network risk situation graph in real-time will be obtained.

Item Type: Article
Uncontrolled Keywords: irt, hierarchical model, risk assessment, network security
Subjects: H Social Sciences > H Social Sciences (General)
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
QA75 Electronic computers. Computer science
Depositing User: EAI Editor IV
Date Deposited: 26 Mar 2021 13:50
Last Modified: 26 Mar 2021 13:50

Actions (login required)

View Item
View Item