{"title":"Vulnerability Threat Assessment Based on AHP and Fuzzy Comprehensive Evaluation","authors":"Jiao Yue, Ke Zhang","doi":"10.1109/ISCID.2014.231","DOIUrl":null,"url":null,"abstract":"The paper starts with the study of present methods for evaluation of Vulnerability Threat. It puts forward a new classification method to make up the insufficiency of key elements of assessment. It establish the index system by considering the aspects of time, environment and attack damages and so on. It proposes an assessment method based on Analytic Hierarchy Process (AHP) and fuzzy comprehensive evaluation, obtaining the factor weights by AHP, and quantifying the vulnerability based on the fuzzy comprehensive evaluation. At the end, it gives a practical example to prove that this method can be applied very well for vulnerability harm assessment.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"123 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Seventh International Symposium on Computational Intelligence and Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCID.2014.231","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The paper starts with the study of present methods for evaluation of Vulnerability Threat. It puts forward a new classification method to make up the insufficiency of key elements of assessment. It establish the index system by considering the aspects of time, environment and attack damages and so on. It proposes an assessment method based on Analytic Hierarchy Process (AHP) and fuzzy comprehensive evaluation, obtaining the factor weights by AHP, and quantifying the vulnerability based on the fuzzy comprehensive evaluation. At the end, it gives a practical example to prove that this method can be applied very well for vulnerability harm assessment.