An Evaluating Model for Anti-virus Ability Based on AHP

作者: Ming Liu , Lansheng Han , Mengsong Zou , Qiwen Liu

DOI: 10.1109/CSE.2009.334

关键词: Consistency (database systems)Data miningContrast (statistics)Blocking (computing)Set (abstract data type)Computer scienceAnalytic hierarchy processArtificial intelligenceAnti virusComputer virus

摘要: Defending computer virus attacks needs to consume a large amount of various types resources. In order achieve the minimum input resources and optimized allocation, administrators need determine compare anti-virus ability nodes in network environment. addition, determining also has very important significance for researches on many aspects including propagation methods, immunization, source-finding virus, blocking spread virus. With use Analytic Hierarchy Process (AHP), an analytic hierarchy model was set up. To weight each indicator, contrast matrixes indicators were given, corresponding eigenvectors calculated consistency verified. The final completion compared.

参考文章(10)
Lansheng Han, Hui Liu, Baffour Kojo Asiedu, Analytic model for network viruses international conference on natural computation. pp. 903- 910 ,(2005) , 10.1007/11539902_111
Mihai Christodorescu, Somesh Jha, Static analysis of executables to detect malicious patterns usenix security symposium. pp. 12- 12 ,(2003) , 10.21236/ADA449067
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji, Intrusion detection using sequences of system calls Journal of Computer Security. ,vol. 6, pp. 151- 180 ,(1998) , 10.3233/JCS-980109
Eric Filiol, Malware Pattern Scanning Schemes Secure Against Black-box Analysis Journal in Computer Virology. ,vol. 2, pp. 35- 50 ,(2006) , 10.1007/S11416-006-0009-X
Krishnamurty Muralidhar, Radhika Santhanam, Rick L. Wilson, Using the analytic hierarchy process for information system project selection Information & Management. ,vol. 18, pp. 87- 95 ,(1990) , 10.1016/0378-7206(90)90055-M
Lansheng Han, Shuxia Han, Qingmei Deng, Junqing Yu, Yunfeng He, Source Tracing and Pursuing of Network Virus computer and information technology. pp. 230- 235 ,(2008) , 10.1109/CIT.2008.WORKSHOPS.25
Ming Liu, Lansheng Han, Fan Hong, Mengsong Zou, A Computer Virus Propagation Model in P2P Networks international workshop on education technology and computer science. ,vol. 1, pp. 578- 581 ,(2009) , 10.1109/ETCS.2009.137
Sébastien Josse, How to Assess the Effectiveness of your Anti-virus? Journal in Computer Virology. ,vol. 2, pp. 51- 65 ,(2006) , 10.1007/S11416-006-0016-Y
M.G. Schultz, E. Eskin, F. Zadok, S.J. Stolfo, Data mining methods for detection of new malicious executables ieee symposium on security and privacy. pp. 38- 49 ,(2001) , 10.1109/SECPRI.2001.924286
Thomas L. Saaty, How to make a decision: The analytic hierarchy process European Journal of Operational Research. ,vol. 48, pp. 9- 26 ,(1990) , 10.1016/0377-2217(90)90057-I