By Topic

A methodology to selecting optimal security policy for adaptive intrusion tolerant secure communication systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Shu-Min Song ; Inst. of Electron. Technol., Inf. Eng. Univ., Zhengzhou ; Yuan-Bo Guo ; Zhen Song ; Ya-Di Wang

Adaptation is a very crucial aspect of intrusion tolerance. In order to be tolerant in front of an attack, applications must change its security policies to be adaptive to the damaged environment. But selection of suitable optimal security policy for typical conditions and network environment is found to be a multi-criteria decision making problem. The procedure is found to be unstructured, characterized by extensive domain dependent knowledge and requiring the application of an effective and efficient multi-criteria decision making tool. The AHP technique breaks down decision making problems into finer parts to allow for easier and more logical selections. The following paper focuses on the application of the AHP technique in selecting the suitable optimal security policy for typical conditions and network environment. The relative importance of each criteria, subcriteria and sub-subcriteria is measured using pairwise comparison matrices and the overall ranking of each alternative equipment is then determined.

Published in:

Machine Learning and Cybernetics, 2008 International Conference on  (Volume:2 )

Date of Conference:

12-15 July 2008