首页> 外文会议> >Comparison of computer attacks: an application of interval-based fuzzy integration
【24h】

Comparison of computer attacks: an application of interval-based fuzzy integration

机译:比较计算机攻击:基于间隔的模糊积分的应用

获取原文

摘要

In recent years, there has been a huge increase in the number of reported computer attacks. Hacking skills are not even necessary anymore. Therefore, network and system protection have become critical issues for companies. In order to know how to protect a system, we need to understand what impact an attack may have, and more specifically, we need to order attacks in terms of their impact on the system to be protected. To do so, attacks have to be classified with respect to a set of well defined criteria or attributes. This paper shows how we can use 2-additive measures and integrals, that take interval monodimensional utility functions as inputs, and have interval values can be used as accurate aggregation operators to classify network attacks. Yet, the use of 2-additive measures, instead of more general fuzzy measures allows us to keep the complexity of the problem under control in O(n/sup 2/).
机译:近年来,报告的计算机攻击数量巨大增加。黑客技能甚至不需要了。因此,网络和系统保护已成为公司的关键问题。为了了解如何保护系统,我们需要了解攻击可能拥有的影响,更具体地说,我们需要在他们对系统的影响方面进行攻击。为此,必须对一组良好定义的标准或属性进行分类。本文展示了如何使用2 - 附加度量和积分,该措施将间隔单维式实用程序函数作为输入,并且可以使用间隔值作为准确的聚合运算符来对网络攻击进行分类。然而,使用2附加措施,而不是更一般的模糊措施使我们能够在O(N / SUP 2 /)中保持问题的复杂性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号