2023
DOI: 10.3390/electronics12163458
|View full text |Cite
|
Sign up to set email alerts
|

AHP-Based Network Security Situation Assessment for Industrial Internet of Things

Abstract: The Industrial Internet of Things (IIoT) is used in various industries to achieve industrial automation and intelligence. Therefore, it is important to assess the network security situation of the IIoT. The existing network situation assessment methods do not take into account the particularity of the IIoT’s network security requirements and cannot achieve accurate assessment. In addition, IIoT transmits a lot of heterogeneous data, which is subject to cyber attacks, and existing classification methods cannot … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…The purpose of the consistency test is to prevent logical errors such as "A is extremely more important than B, B is extremely more important than C, and C is extremely more important than A". If the matrix fails the consistency test, it should be readjusted until it meets the conditions [36]. The steps for the consistency test are as follows:…”
Section: Consistency Test Of the Judgment Matrixmentioning
confidence: 99%
“…The purpose of the consistency test is to prevent logical errors such as "A is extremely more important than B, B is extremely more important than C, and C is extremely more important than A". If the matrix fails the consistency test, it should be readjusted until it meets the conditions [36]. The steps for the consistency test are as follows:…”
Section: Consistency Test Of the Judgment Matrixmentioning
confidence: 99%
“…It took the change in the weighted index values after the network was attacked as the security situation results. Yi and Guo [15] considered the special network security requirements of the IIoT and proposed a quantitative evaluation method of network security based on the AHP. Hu [16] combined support vector machines and improved the cuckoo algorithm to predict network security postures, and the method achieved a high accuracy in its performance on the data mining and knowledge discovery (KDD) data set.…”
Section: Introductionmentioning
confidence: 99%