Research Article
Network Security Risk Assessment Based on Item Response Theory
@ARTICLE{10.4108/icst.mobimedia.2015.259024, author={Fangwei Li and Qing Huang and Jiang Zhu and Zhuxun Peng}, title={Network Security Risk Assessment Based on Item Response Theory}, journal={EAI Endorsed Transactions on Security and Safety}, volume={2}, number={5}, publisher={EAI}, journal_a={SESA}, year={2015}, month={8}, keywords={irt, hierarchical model, risk assessment, network security}, doi={10.4108/icst.mobimedia.2015.259024} }
- Fangwei Li
Qing Huang
Jiang Zhu
Zhuxun Peng
Year: 2015
Network Security Risk Assessment Based on Item Response Theory
SESA
EAI
DOI: 10.4108/icst.mobimedia.2015.259024
Abstract
Owing to the traditional risk assessment method has one-sidedness and is difficult to reflect the real network situation, a risk assessment method based on Item Response Theory (IRT) is put forward in network security. First of all, the novel algorithms of calculating the threat of attack and the successful probability of attack are proposed by the combination of IRT model and Service Security Level. Secondly, the service weight of importance is calculated by the three-demarcation analytic hierarchy process. Finally, the risk situation graph of service, host and network logic layer could be generated by the improved method. The simulation results show that this method can be more comprehensive consideration of factors which are affecting network security, and a more realistic network risk situation graph in real-time will be obtained.
Copyright © 2015 Q. Huang et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.