Network Security Risk Assessment Based on Item Response Theory

Authors

  • Fangwei Li Chongqing University of Posts and Telecommunications image/svg+xml
  • Qing Huang Chongqing University of Posts and Telecommunications image/svg+xml
  • Jiang Zhu Chongqing University of Posts and Telecommunications image/svg+xml
  • Zhuxun Peng Chongqing University of Posts and Telecommunications image/svg+xml

DOI:

https://doi.org/10.4108/icst.mobimedia.2015.259024

Keywords:

irt, hierarchical model, risk assessment, network security

Abstract

Owing to the traditional risk assessment method has one-sidedness and is difficult to reflect the real network situation, a risk assessment method based on Item Response Theory (IRT) is put forward in network security. First of all, the novel algorithms of calculating the threat of attack and the successful probability of attack are proposed by the combination of IRT model and Service Security Level. Secondly, the service weight of importance is calculated by the three-demarcation analytic hierarchy process. Finally, the risk situation graph of service, host and network logic layer could be generated by the improved method. The simulation results show that this method can be more comprehensive consideration of factors which are affecting network security, and a more realistic network risk situation graph in real-time will be obtained.

Downloads

Published

03-08-2015

How to Cite

Li, F. ., Huang, Q. ., Zhu, J. ., & Peng, Z. . (2015). Network Security Risk Assessment Based on Item Response Theory. EAI Endorsed Transactions on Security and Safety, 2(5), e5. https://doi.org/10.4108/icst.mobimedia.2015.259024