Abstract
The computer network environment is very complex, and there are many factors that need to be considered in the process of network security evaluation. At the same time, various factors have complex nonlinear relationships. Neural networks are mathematical models that simulate the behavioral characteristics of animal neural networks. They process information by adjusting the connection relationships of internal nodes, and have a wide range of applications in solving complex nonlinear relationship problems. The computer network security evaluation is multiple attribute group decision making (MAGDM) problems. In this paper, based on projection measure and bidirectional projection measure, we shall introduce four forms projection models with q-rung orthopair fuzzy sets (q-ROFSs). Furthermore, combine projection measure and bidirectional projection measure with q-ROFSs, we develop four forms of projection models with q-ROFSs. Based on developed weighted projection measure models, the multiple attribute group decision making (MAGDM) model is established and all computing steps are simply depicted. Finally, a numerical example for computer network security evaluation is given to illustrate this new model and some comparisons are also conducted to verify advantages of the new built methods.
Keywords
Introduction
The high complexity of the network environment has led to an increasing number of network security threats faced by computers [1, 2]. Network attacks such as network intrusions, computer viruses, and illegal access are not only highly harmful in themselves, but also have a high correlation with each other [3, 4]. In computer security evaluation, it is often necessary to consider multiple complex factors and clarify the non-linear relationship between various factors, this undoubtedly brings higher requirements to the traditional computer security evaluation system [5, 6, 7]. Due to limitations in technology and other aspects, traditional security evaluation models cannot achieve sufficient accuracy. Computers have brought the information age to the people. On the contrary, in the information age, they have also promoted the development of computer networks, which have been widely used in various industries [8, 9, 10, 11]. They have brought great convenience to the people’s lives and high economic benefits to social production. At the same time, with the accelerated development of computer networks, network security issues have become increasingly prominent, causing adverse effects on the lives and social production of the people [12, 13]. Strengthening research on security evaluation is the primary task for computer professionals. Computer security evaluation can be understood as an assessment of the security of computer usage. Generally speaking, computer security evaluation includes the evaluation of multiple indicators such as data security, device stability, data integrity, and data confidentiality [14, 15, 16]. Physical security refers to the use of physical protection to ensure that a computer is in a stable and reliable state at all times during operation, preventing data loss caused by physical damage. Logical security refers to the availability, confidentiality, and integrity of information data, mainly achieved through software protection [17, 18]. From this, it can be seen that the network security evaluation of computers is multidimensional, including not only the security of hardware usage, but also the security of data transmission and software usage. The development of computer network technology has created infinite progress and wealth for society, but at the same time, it also hides huge security risks [19, 20]. According to statistics, a new computer may be discovered within 15 minutes of accessing the internet, and a network intrusion case is reported globally every 20 seconds, posing a threat to network security. In theory, network security includes two aspects: technical level and management level, with the former focusing on preventing external illegal attacks [21, 22]. The latter focuses on internal human management, and both complement each other and are indispensable. However, due to the openness, freedom of movement, and international nature of the network, users accessing information through the internet will inevitably increase their probability of being attacked, thus there are many security risks in computer networks [23, 24]. Computer network security evaluation is actually the analysis and evaluation of whether the use of computer networks is good, whether the security meets the requirements, and the classification of computer network security levels. With the continuous improvement of people’s living standards and the rapid popularization of computers, people are paying more and more attention to computer security and yearning for their information to be protected [25, 26]. At the same time, the network security of computers is influenced by multiple factors, and traditional linear network security evaluation cannot accurately capture vulnerabilities and timely reflect the operation status of computers. Therefore, it is necessary to apply neural networks to computer network security analysis to timely and accurately reflect the security status of computers and reduce user losses [27, 28].
In real society, no matter individuals or organizations, they are always faced with decision-making problems [29, 30, 31, 32, 33, 34]. The MADM problem based on different attributes to select several options is one of the most important problems in decision-making problems [35, 36, 37]. Similar to the MADM, the multicriteria Decision Analysis (MCDA) is the important research parts in practical management science [38, 39, 40, 41]. In many MCDA problems, due to the limitations which recognizing the practical decision-making problem, it is often impossible to depict the accurate information and could only be portrayed through the uncertainty which constitutes the uncertain MCDA issue [42, 43, 44, 45]. MAGDM has extensive practicability and applicability in many fields such as industry, economy and management [46, 47, 48, 49, 50]. Motivated by the theories of intuitionistic fuzzy sets (IFSs) and Pythagorean fuzzy sets (PFSs) [51, 52, 53, 54, 55, 56], in order to portray more fuzzy and uncertain information, Yager [57] put forward the q-rung orthopair fuzzy sets (q-ROFSs), which meets the condition that the sum of q-th power of them is equal or less than 1. Evidently, the q-ROFSs is the generalization of IFS and PFSs, especially, when
To do so, the remainder of this paper is set out as follows. The concepts of q-ROFSs are introduced in Section 2. Section 3 combines traditional projection and bidirectional projection measures with q-ROFSs. In Section 4, two decision models based on our developed models is built to deal with MAGDM. In Section 5, we give a numerical example for computer network security evaluation with q-ROFNs, in addition, some comparisons are also conducted to verify advantages of the built methods. Section 6 concludes such paper.
Preliminaries
The q-ROFSs
The q-ROFSs [57] is introduced.
where the function
For two q-ROFNs
In this section, the q-ROFWA and q-ROFWG operator [60] is introduced.
and
In this section, combine the traditional projection, bidirectional projection and q-ROFNs, we shall give some projection measures and weighted projection measures under q-ROFSs.
Some projection measures with q-ROFNs
In this part, some projection measure and weighted projection measure under q-ROFSs are defined.
where
Obviously, the greater the value
However, in practical decision making environment, the weighting values of evaluation information is an important factor which needs to be considered, thus, let
where
where
In this section, we shall introduce the q-rung orthopair fuzzy bidirectional projection measure and q-rung orthopair fuzzy weighted bidirectional projection measure to overcome the limitation of the general projection measure of q-ROFNs.
where
Obviously, the greater the value
Consider the weighting vector of q-ROFNs, the weighted bidirectional projection of vector
where
where
Suppose there are
The weight is important for MAGDM. Many scholars focused on to obtain the weight information under different environment [61, 62, 63, 64, 65]. Entropy [66] is a conventional theory to derive weight. Firstly, the normalized q-ROFN-matrix
Then, the q-ROFN Shannon entropy
and
Then, the weights
Numerical example
The rapid development of computer network technology has led to a rapid increase in various network service applications, and the diversity of network services has increased the difficulty of network security maintenance, posing a huge threat to computer network security. The frequent occurrence of viruses and network hacker attacks has had a very adverse impact on the stability of the computer network environment, greatly increasing the difficulty of network security defense. There are many factors that affect computer network security, and a network security evaluation system must objectively and accurately evaluate security risks. The so-called accuracy refers to the high reliability and accuracy of computer network security evaluation indicators, which can accurately present the level of network security in different states. Computer network security evaluation should follow four principles Accuracy is the foundation of computer network security evaluation. Only by ensuring the accuracy of computer network security evaluation can network security evaluation be valuable, otherwise computer network security evaluation will lose its due value. The so-called integrity refers to the fact that when evaluating computer network security, the security status of the computer network presented by various indicators should be complete. In the process of selecting network security evaluation indicators in practice, it is necessary to have a deep understanding of the connotation of each evaluation indicator, ensure the rationality and effectiveness of the evaluation indicators, avoid useless indicators and duplicate selection of evaluation indicators, and provide strong data support for accurate evaluation of network security. The so-called independence refers to the need to avoid duplicate indicators when constructing computer network security evaluation indicators, so that there is no overlap between the selected evaluation indicators and the correlation between the indicators is eliminated. Ensuring the independence of the selected computer network security evaluation indicators can greatly reduce the amount of data for security evaluation and improve the accuracy of network security evaluation. The so-called simplicity refers to the fact that the selected network security evaluation indicators should be concise and concise, with obvious characteristics in the process of selecting evaluation indicators, which is helpful for practical evaluation operations. The frequent occurrence of computer network security accidents has led to the deterioration of the computer network environment. During the development of computer networks, viruses and hacker attacks have always existed, and often have high concealment. Meanwhile, with the development of computer network viruses, their destructive power has greatly increased. For computer network users, their own network security awareness is insufficient, lacking network security awareness, which also makes it difficult to maintain computer network security, creating conditions for criminals to attack computer networks. The computer network security evaluation is classical MADM problems. In this section, we shall provide a numerical example for computer network security evaluation by using our developed projection model with q-ROFNs. Assume that five possible computer networks
Linguistic scale and q-ROFNs
Linguistic scale and q-ROFNs
The weighted projection measure is used to solve the computer network security evaluation.
Evaluation information by
Evaluation information by
Evaluation information by
Then according to q-ROFWA, the
The
The attribute weight information
The ideal alternative
The weighted projection measure
The order of different alternatives
Finally, the decision order could be obtained:
Then, the weighted projection measure under q-ROFNs is compared with q-ROFWA operator [60], q-ROFWG operator [60], q-rung orthopair fuzzy weighted exponential aggregation (q-ROFWEA) operator [68], q-rung orthopair fuzzy Dombi weighted average (q-ROFDWA) operator [69], q-rung orthopair fuzzy Dombi weighted geometric (q-ROFDWG) operator [69], q-rung orthopair fuzzy EDAS (q-ROF-EDAS) method [70], q-rung orthopair fuzzy VIKOR (q-ROF-VIKOR) method [71] and q-rung orthopair fuzzy TODIM (q-ROF-TODIM) method [72]. The comparative decision results are shown in Table 10.
Order of the different methods
Order of the different methods
In accordance with RW coefficients [73], the RW coefficient calculation between q-ROFWA operator [60], q-ROFWG operator [60], q-rung orthopair fuzzy weighted exponential aggregation (q-ROFWEA) operator [68], q-rung orthopair fuzzy Dombi weighted average (q-ROFDWA) operator [69], q-rung orthopair fuzzy Dombi weighted geometric (q-ROFDWG) operator [69], q-rung orthopair fuzzy EDAS (q-ROF-EDAS) method [70], q-rung orthopair fuzzy VIKOR (q-ROF-VIKOR) method [71], q-rung orthopair fuzzy TODIM (q-ROF-TODIM) method [72] and the proposed weighted projection measure under q-ROFNs is 1.0000, 0.9167, 1.0000, 1.0000, 0.9167, 1.0000, 1.0000, 1.0000, respectively. The RW coefficient calculation shows that the order result of q-ROFWA operator [60], q-rung orthopair fuzzy weighted exponential aggregation (q-ROFWEA) operator [68], q-rung orthopair fuzzy Dombi weighted average (q-ROFDWA) operator [69], q-rung orthopair fuzzy EDAS (q-ROF-EDAS) method [70], q-rung orthopair fuzzy VIKOR (q-ROF-VIKOR) method [71] and q-rung orthopair fuzzy TODIM (q-ROF-TODIM) method [72] is same with the order result of the proposed weighted projection measure under q-ROFNs, however, The RW coefficient calculation shows that the order result of q-ROFWG operator [60] and q-rung orthopair fuzzy Dombi weighted geometric (q-ROFDWG) operator [69] is slightly different form the order result of the proposed weighted projection measure under q-ROFNs. From the above detailed analysis, it could be seen that the order of these models is slightly different, however, these models have the same optimal computer network system and worst computer network system. This shows the proposed weighted projection measure under q-ROFNs is reasonable and effective.
The rapid development of computer network technology has made it widely applied in all aspects of national economic life. While citizens enjoy the convenience brought by computer networks, network security issues have also received attention. Criminals exploit security vulnerabilities in computer networks to steal confidential information from computer networks through methods such as Trojan viruses and network intrusions, resulting in huge economic losses for enterprises or individuals. Improving the security of computer networks and ensuring the stability of learning and work for network users is a challenge faced by the development of computer networks. The computer network security evaluation is classical MADM problems. Combine the advantages of the traditional projection measure and q-ROFSs, in this paper, based on projection measure and bidirectional projection measure, we propose four forms of projection measure with q-ROFNs, such as: q-rung orthopair fuzzy projection measure, q-rung orthopair fuzzy weighted projection measure, q-rung orthopair fuzzy bidirectional projection measure and q-rung orthopair fuzzy weighted bidirectional projection measure. According to the two weighed form projection models, we build the decision-making model to deal with MAGDM. Finally, a numerical example for computer network security evaluation is given to testify the scientific and effective of our developed models, moreover, some comparative analysis is conducted to demonstrate the advantages of our proposed methods. The main research contribution of this paper is constructed: (1) the projection measure and bidirectional projection measure is extended to the q-ROFSs; (2) some projection measures are constructed to handle MAGDM problems under q-ROFSs; (3) the information Entropy is used to obtain the weight values based on the score value and accuracy value under q-ROFSs; (4) Finally, a numerical case study for computer network security evaluation and some comparisons are conducted to validate the proposed method. In the future, we shall continue to investigate the MAGDM problems under q-ROFNs and extend our developed projection measure and bidirectional projection measure to other uncertain environments.
Footnotes
Acknowledgments
This work was supported by Vocational Education Working Committee of China Communications Society, Intelligent recommendation based on big data Application in “Precision Employment” Using research and the research on the digital transformation path of small and medium-sized enterprises empowered by artificial Intelligence. (RKX033).
