• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

提高网络抵御分布式拒绝服务攻击的弹性:一种基于模糊理想解排序法的定量评估方法。

Improving network resilience against DDoS attacks: A fuzzy TOPSIS-based quantitative assessment approach.

作者信息

Almotiri Sultan H

机构信息

Department of Cybersecurity, College of Computing, Umm Al-Qura University, Makkah 24211, Saudi Arabia.

出版信息

Heliyon. 2024 Nov 14;10(22):e40413. doi: 10.1016/j.heliyon.2024.e40413. eCollection 2024 Nov 30.

DOI:10.1016/j.heliyon.2024.e40413
PMID:39641087
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11617140/
Abstract

Security in data transmission is becoming problematic due to the internet's explosive growth as well as the spread of social media and digital advertising platforms, which have produced enormous volumes of data every day. In order to safeguard sensitive data, network security is becoming more and more important as technology is adopted. Effective information security measures are needed to protect against a variety of dangers, given the expanding number of users. A key factor in improving security is network security attributes, which include message encryption, password breaking, safeguarding wireless networks, and finding security holes. This paper adopts the Multi-Criteria Decision Making (MCDM) approach, utilising a fuzzy TOPSIS-based method, with the objective of systematically evaluating resilience in network security, especially against DDoS attacks. The research assesses different security attributes and vulnerabilities to offer actionable insights on how best to strengthen organizational cybersecurity frameworks. The methodology encompasses conducting network security audits to identify vulnerabilities that could compromise commercial operations or expose sensitive data. The findings provide critical insights that can inform targeted actions to address these vulnerabilities and enhance resource protection. The results indicate that network N6 is the most secure under DDoS attacks, followed by networks N1, N5, N3, N4, and N2. This research is significant as it aids strategic decision-making, strengthens network defenses, and enhances overall cybersecurity resilience in an era of evolving cyber threats. By addressing the complexities of network security assessments, this study makes a crucial contribution to the ongoing efforts of organisations to safeguard their data, employees, and customer information from sophisticated cyber threats.

摘要

由于互联网的爆炸式增长以及社交媒体和数字广告平台的普及,数据传输安全正变得越来越成问题,这些平台每天都会产生大量数据。为了保护敏感数据,随着技术的采用,网络安全变得越来越重要。鉴于用户数量不断增加,需要有效的信息安全措施来防范各种危险。提高安全性的一个关键因素是网络安全属性,其中包括消息加密、破解密码、保护无线网络以及发现安全漏洞。本文采用多准则决策(MCDM)方法,利用基于模糊TOPSIS的方法,旨在系统地评估网络安全的弹性,尤其是抵御分布式拒绝服务(DDoS)攻击的能力。该研究评估了不同的安全属性和漏洞,以提供关于如何最好地加强组织网络安全框架的可操作见解。该方法包括进行网络安全审计,以识别可能危及商业运营或暴露敏感数据的漏洞。研究结果提供了关键见解,可为解决这些漏洞和加强资源保护的针对性行动提供参考。结果表明,在DDoS攻击下,网络N6最安全,其次是网络N1、N5、N3、N4和N2。这项研究具有重要意义,因为它有助于战略决策,加强网络防御,并在网络威胁不断演变的时代提高整体网络安全弹性。通过解决网络安全评估的复杂性,本研究为组织持续努力保护其数据、员工和客户信息免受复杂网络威胁做出了关键贡献。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9ded/11617140/eb887aa10be7/gr4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9ded/11617140/239dee7a1c1b/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9ded/11617140/119bbd5325f1/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9ded/11617140/5377708cb1a1/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9ded/11617140/eb887aa10be7/gr4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9ded/11617140/239dee7a1c1b/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9ded/11617140/119bbd5325f1/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9ded/11617140/5377708cb1a1/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9ded/11617140/eb887aa10be7/gr4.jpg

相似文献

1
Improving network resilience against DDoS attacks: A fuzzy TOPSIS-based quantitative assessment approach.提高网络抵御分布式拒绝服务攻击的弹性:一种基于模糊理想解排序法的定量评估方法。
Heliyon. 2024 Nov 14;10(22):e40413. doi: 10.1016/j.heliyon.2024.e40413. eCollection 2024 Nov 30.
2
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
3
Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS.基于模糊层次分析法-逼近理想解排序法对 Gen V 多向量攻击下的现代入侵检测方法进行评估。
PLoS One. 2024 May 14;19(5):e0302559. doi: 10.1371/journal.pone.0302559. eCollection 2024.
4
We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.我们需要瞄准高端:与网络和信息安全决策者的网络安全意识相关的因素。
PLoS One. 2024 Oct 18;19(10):e0312266. doi: 10.1371/journal.pone.0312266. eCollection 2024.
5
Integrating machine learning for sustaining cybersecurity in digital banks.整合机器学习以维持数字银行的网络安全。
Heliyon. 2024 Sep 6;10(17):e37571. doi: 10.1016/j.heliyon.2024.e37571. eCollection 2024 Sep 15.
6
Novel Machine Learning Approach for DDoS Cloud Detection: Bayesian-Based CNN and Data Fusion Enhancements.用于分布式拒绝服务云检测的新型机器学习方法:基于贝叶斯的卷积神经网络和数据融合增强
Sensors (Basel). 2024 Feb 22;24(5):1418. doi: 10.3390/s24051418.
7
Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications.Memcached:一种针对物联网应用的健康状况的 DDoS 攻击的实验研究。
Sensors (Basel). 2021 Dec 2;21(23):8071. doi: 10.3390/s21238071.
8
Implementation of a novel secured authentication protocol for cyber security applications.一种用于网络安全应用的新型安全认证协议的实现。
Sci Rep. 2024 Oct 28;14(1):25708. doi: 10.1038/s41598-024-76306-z.
9
Pioneering advanced security solutions for reinforcement learning-based adaptive key rotation in Zigbee networks.为Zigbee网络中基于强化学习的自适应密钥轮换开创先进的安全解决方案。
Sci Rep. 2024 Jun 17;14(1):13931. doi: 10.1038/s41598-024-64895-8.
10
Dataset of DDoS attacks on Fibaro home center 3 for smart home security.用于智能家居安全的针对Fibaro家庭中心3的分布式拒绝服务攻击数据集。
Data Brief. 2024 Oct 3;57:110991. doi: 10.1016/j.dib.2024.110991. eCollection 2024 Dec.

本文引用的文献

1
A method for selecting processes for automation with AHP and TOPSIS.一种运用层次分析法(AHP)和逼近理想解排序法(TOPSIS)选择自动化流程的方法。
Heliyon. 2023 Feb 14;9(3):e13683. doi: 10.1016/j.heliyon.2023.e13683. eCollection 2023 Mar.
2
A review of threat modelling approaches for APT-style attacks.针对高级持续性威胁(APT)式攻击的威胁建模方法综述。
Heliyon. 2021 Jan 16;7(1):e05969. doi: 10.1016/j.heliyon.2021.e05969. eCollection 2021 Jan.
3
A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development.
基于模糊 TOPSIS 的可信医疗软件开发有效安全需求工程方法选择分析。
BMC Med Inform Decis Mak. 2020 Sep 18;20(1):236. doi: 10.1186/s12911-020-01209-8.