Advertisement

Cyberspace Security Evaluation Technology on the Condition of Attack and Defense Confrontation

  • Zhang Bo
  • Wen TaoEmail author
  • Lei Jing
  • Yang Yunxiang
  • Guo Jing
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 517)

Abstract

The blurred synthesis evaluation arithmetic based on analytic network process and systemic security evaluation target system is designed, and the main technology and system realization of cyberspace security evaluation system are presented, which is realized based on fight theory’s attack and defense affection evaluation and systemic security evaluation technology. The technology and system can provide a systemic security evaluation to information system target’s security and put forward security resolve scheme suggestions, which have important effect and meaning on accelerating China’s cyberspace war ability.

Keywords

Cyberspace Attack and defense confrontation Security evaluation 

Notes

Acknowledgements

This paper is supported by Beijing NOVA Program (Z181100006218041).

References

  1. 1.
    Liu, X., Chen, M., Li, Y.-B., Yu, J.: Cyber War, pp. 2–3. National Defense Industry Press, Beijing (2011)Google Scholar
  2. 2.
    Zeng, Q., Xu, F., Zhang, Y.: Information Security Framework, pp. 15–20. Publishing House of Electronics Industry, Beijing (2010)Google Scholar
  3. 3.
    Wang, C., Chen, J., Hu, C., Sun, Y.: Kernel matrix learning with a general regularized risk functional criterion. J. Syst. Eng. Electron. 21(1), 72–80 (2010)CrossRefGoogle Scholar
  4. 4.
    Niu, T., Tian, Z.: The network active defense research based on the game theory and the analysis of network vulnerabilities. Intell. Comput. Appl. 2(3), 57–58 (2012)Google Scholar
  5. 5.
    Zhang, X., Yao, S., Tang, C.: Assessing the risk situation of network security for active defense. Wuhan Univ. J. Nat. Sci. 11(6), 1718–1719 (2006)CrossRefGoogle Scholar
  6. 6.
    Xiang, H., Li, F., Banghua, Z.: Information Security Test with Evaluation and Risk Assessment, pp. 313–314. Beijing: Publishing House of Electronic Industry (2009)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Zhang Bo
    • 1
  • Wen Tao
    • 1
    Email author
  • Lei Jing
    • 1
  • Yang Yunxiang
    • 1
  • Guo Jing
    • 1
  1. 1.China Academy of Electronics and Information TechnologyBeijingChina

Personalised recommendations