• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2010, Vol. 32 ›› Issue (12): 27-29.doi: 10.3969/j.issn.1007130X.2010.

• 论文 • Previous Articles     Next Articles

The Realization of Evaluation for Network Intrusion Based on Cloud Theory

WAN Biao   

  1. (1.School of Computer Science and Engineering,China University of Geosciences,Wuhan 430074;
    2.School of Computer Science and Software,Wuhan Institute of Technology,Wuhan 430074,China)  
  • Received:2009-06-26 Revised:2009-09-28 Online:2010-12-25 Published:2010-12-25

Abstract:

Network intrusion has the features of randomness and uncertainty, cloud theory

integrates the fuzziness and randomness perfectly. An evaluation model for network risk is

proposed based on the cloud theory. The model monitors the system resources and processes

the achieved data, then the data is input into the cloud controls, the evaluation result is

achieved finally. The experimental results show that the methods can evaluate the network

risk efficiently. It holds the uncertainty of evaluation process and improves the

reliability of the result.

Key words: network intrusion;cloud theory;cloud algorithm;randomness