Interoperable Defensive Strategies of Network Security Evaluation

IEEE ACCESS(2024)

引用 0|浏览0
暂无评分
摘要
To advance defense interoperability, foster productive collaboration, and enhance the capabilities of defense systems to respond to evolving threats, it is imperative to tackle the challenges of defensive strategic issues in Network security. That is why an experimental study was done to assess the application of the interoperability defense theory to an operational target network system. The study used five strategies, including "Risk," "Complexity,"Dependency," "Personnel," and "Environment," and employed DEMATEL and performance analysis evaluation. These five defense techniques to interoperability are conceptualized. The experimental results revealed that network defense, instead of being consistently passive, is the recipient of influence in an interoperable defensive system. Interoperability protective strategies have varying degrees of influence on network security evaluations. A significant relationship was observed between the level of technological complexity and the ability to tolerate its significant effects. Within the complexity group, further analysis showed a noteworthy reduction in "Risk". However, there were no significant variations in " Environment" before and after the interoperable implementation. Finally, the DEMATEL analysis indicates that the entire variables are effect criteria no cause criteria. Given that all criteria are categorized as "effect" and none as "cause," it suggests a scenario in which each criterion is interconnected and influenced by other criteria within the system, but none of them serve as direct influencers or causes. Therefore, this study contributes to the evaluation of interoperability in strategic network security defense.
更多
查看译文
关键词
Network security,interoperable defense,interoperable complexity,defensive strategies
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要