A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty

: Nowadays, computer networks are playing a more and more important role in people’s daily lives. Meanwhile, the security of computer networks has also attracted widespread concern. However, up to now, there is no universal and effective assessment approach for computer network security. Therefore, a novel network security risk assessment approach by combining subjective and objective weights under uncertainty is proposed. In the proposed evaluation approach, the uncertainty of evaluation data is taken into account, which is translated into objective weights through an uncertainty measure. By combining the subjective weights of evaluation criteria and the objective weights of evaluation data, the ﬁnal weights can be obtained. Then, Dempster–Shafer (D-S) evidence theory and pignistic probability transformation (PPT) are employed to derive a consensus decision for the degree of the network security risk. Two illustrative examples are given to show the efﬁciency of the proposed approach. This approach of risk assessment, which combines subjective and objective weights, can not only effectively evaluate computer network security, but also be widely used in decision-making.


Introduction
The cyber physical system is a multi-dimensional complex system that integrates computing, the network and the physical environment, and it has a wide range of applications [1,2].When it comes to computing, many studies such as research on cloud computing have been conducted [3].Furthermore, network security is also a rather significant component of cyber physical systems.The last few years have witnessed a burst in the exploration of network security, such as network security studies of SCADA (supervisory control and data acquisition) systems [4], the Internet of Things [5], software-defined networks [6], wireless sensor networks [7] and the smart grid [8].Besides, many studies have researched the security of computer networks because of the emergence of a large number of cyber crimes, which are researched in many studies [9,10].To combat cyber crimes vigorously, studies regarding computer forensics [11,12], virus prevention technologies [13], security visualization for computer network logs [14], intrusion detection [15], etc., have been performed in recent years.In addition, approaches of computer network security risk assessment are also of great significance to improve computer network security.
There is a variety of approaches to assess the security of computer networks, such as game theory [16], RBF (radial basis function) neural networks [17], attack graphs [18], vulnerability correlation graphs [19], and so on.In [20], a quantitative measure of the security risk level of networks is proposed to assess network security.Firstly, the vulnerability scanning tool is used to scan the network to determine the vulnerability of each node in the network.Then, the probability approach is employed to calculate the overall security risk level of the sub-networks and the entire network.Besides, the (fuzzy) analytic hierarchy process is also used for network security assessment [21][22][23].In this evaluation method, the index system of network security risk assessment is first established, and then, the (fuzzy) analytic hierarchy process is applied to obtain the final evaluation results.D-S evidence theory is also an effective tool for assessing network security risk [24,25].The index system of network security risk assessment is first needed.Then, based on the weights of indexes and the evaluation data of the bottom criteria (expressed by basic probability assignment (BPA)), D-S evidence theory is used to combine evidence from bottom to top to obtain the risk level of network security.Herein, it is worth noting that the key issue of network security risk assessment is how to deal with the uncertainty information.Many solutions such as fuzzy sets theory [26][27][28], rough sets theory [29], possibility theory [30] and D-S evidence theory [31][32][33][34] can be applied to address the problem.
However, to date, there is no universal and effective method of computer network security risk assessment.Of those studies that apply a comprehensive evaluation method to evaluate networks, only the weights of criteria are taken into account, and the weights of evaluation data are simply ignored.Therefore, a novel approach is proposed in this paper by combining subjective weights of criteria and objective weights of evaluation data under uncertainty.Based on the hierarchical structure of computer networks, subjective weights of all criteria and risk values of bottom criteria are given by experts.Then, by using an uncertainty measure iTU I [35], the uncertainty values of bottom evaluation data are derived.Take the reciprocal of uncertainty values, and then, normalize them to get objective weights.After that, combing the subjective and objective weights and using Dempster's rule of combination [36], the risk values of bottom criteria are fused to be the risk values of the upper level criteria.Using the same method to combine the risk values from bottom to top and applying pignistic probability transformation (PPT) and the principle of maximum membership, the risk level of computer networks is finally derived.
The rest of the article is organized as follows.Section 2 introduces the preliminaries.Section 3 presents the network security risk assessment approach studied in [25] and the new assessment approach implemented in this paper.In Section 4, the validity and robustness of the proposed approach are examined through two numerical examples.Then, the paper is briefly concluded in Section 5.

Dempster-Shafer Evidence Theory
D-S evidence theory [31,32,37] has many advantages in handling uncertain information and can be applied to many fields such as decision-making [38,39], risk assessment [40], reliability analysis [41], and so on.Firstly, D-S evidence theory allows probability masses to be assigned to not only singletons, but also multiple hypotheses, rather than only singleton subsets in comparison to the probability theory.Secondly, information from different sources can be combined without a prior distribution.Thirdly, instead of being forced to be assigned to some singleton subsets, a certain degree of ignorance can be allowed in some situations.A few basic concepts are introduced as follows: Let Θ be a set of mutually exclusive and collectively exhaustive events, indicated by: The set Θ is called a frame of discernment.The power set of Θ is indicated by 2 Θ , namely: If A ∈ 2 Θ , A is called a proposition.In the power set 2 Θ , ∅ is called the empty set, the singletons are {θ 1 } , {θ 2 } , . . . ,{θ N }, and the multiple hypotheses are {θ 1 , θ 2 } , . . . ,{θ 1 , . . . ,θ i } , . . . ,{θ 1 , . . . ,θ N }.
For a frame of discernment Θ, a mass function is a mapping m from 2 Θ to [0, 1], formally defined by: m which satisfies the following condition: In D-S evidence theory, a mass function is also called a basic probability assignment (BPA).BPA reflects the degree of support for the proposition A in the recognition framework.If m(A) > 0, A is called a focal element, and the union is called the core of the mass function.
Associated with each BPA, the belief function Bel and plausibility function Pl are defined as: where Assume there are two BPAs indicated by m 1 and m 2 ; Dempster's rule of combination is used to combine them as follows: where: In D-S evidence theory, K is a coefficient to measure the conflict between pieces of evidence.Note that Dempster's rule of combination is only applicable to two such BPAs that satisfy the condition K < 1, and there are many other combination rules [42,43].It should also be noted that the conflict in D-S evidence theory is an open issue.Many methods have been proposed to address this issue [33,44].

Weighted Average Combination Method of Combining Mass Functions
Dempster's rule of combination will yield counter-intuitive results when combining highly conflicting evidence.Of the alternative methods that address the problem, Murphy proposed an averaging combination method [45].However, the weights of evidence are considered equal in this method, which does not fit most of the actual situations.Therefore, a weighted average combination method of combining mass functions was proposed in [36].This method based on the weights of evidence considers the importance of different evidence and can efficiently handle conflicting evidence with better performance of convergence.The definition is as follows.
In a real system, the importance of each piece of evidence may be different.Suppose that there are n pieces of evidence, denoted as m i , and the weight of each piece of evidence is w i (i = 1, 2, 3, . . .., n).The weighted average of evidence m is given as: The final result can be obtained by using the classical Dempster's rule of combination (Equations (7) and (8) to combine the weighted average of evidence m (n − 1) times.As can be seen from Equation (9), if the weight coefficient of a piece of evidence is greater, this evidence will have a larger effect on the final combination result.On the contrary, if the weight coefficient of a piece of evidence is lower, this evidence should have a smaller effect on the final combination result.

Uncertainty Measure in D-S Evidence Theory
Uncertainty quantification of mass functions is also a crucial and open issue in D-S evidence theory.Many solutions are proposed to solve this problem such as Deng entropy [46], aggregated uncertainty AU [47], the ambiguity measure AM [48], uncertainty measures proposed in [49,50], and so on.In this paper, a distance-based uncertainty measure iTU I [35] is employed to quantify the uncertainty of mass functions in D-S evidence theory, which is an improvement of uncertainty measure TU I [51].This uncertainty measure is defined as below.
Suppose that m is a BPA over FOD (frame of discernment) Θ = {θ 1 , θ 2 , . . . ,θ i , . . . ,θ n }; the total uncertainty measure for m is defined as: where d I E is the Euclidean distance between two interval numbers: Here, since (10) can also be written as: In this paper, the normalization is done.Namely, the total uncertainty measure for m is redefined as:
The essence of PPT is to convert a mass function to a probability distribution.It can be seen from Equation ( 14) that beliefs of multiple-hypothesis focal elements are given to singletons according to the principle of equality.

The Network Security Risk Assessment Approach Proposed by Gao et al.
In [25], an approach for assessing network security was proposed.The specific assessment process can be divided into the following steps.

Establish the Index System of the Network Risk
The index system is a hierarchical structure model, which divides the factors related to network risk into three levels.The framework of the index system of network security risk assessment is shown in Figure 1.The first level of the index system is network security risk assessment, also called the target level.In the second level, there are three criteria, communication and operation, access control and assets, respectively, which are all divided into 2∼5 smaller criteria at the bottom level (see Table 1).

Use D-S Evidence Theory to Fuse Mass Functions
In this approach, the weights of evidence are taken into account when using D-S evidence theory to fuse mass functions.
Let the set of evidence be where Then, the "ratio" of BPA can be determined as α i (0 Use the "ratio" to discount BPA.The BPA after adjustment is: Suppose the risk rank of the network is divided as Ascertain all layer's weights and BPA m ij (x h ) of the bottom layer with regard to represents the uncertainty.Use Equation ( 15) to adjust BPA, and then, use Equations ( 7) and ( 8) to combine evidence from bottom to top.Finally, BPA m (x h ) of the network risk can be obtained (h = 1, 2, • • • , k).Note that BPA of middle level criteria still needs to be adjusted before being combined.After getting m (x h ), the belief function Bel (x h ) of network risk can be obtained by Equation (5).At last, the network security risk value can be obtained through the risk calculation formula: where )} represents the damage degree once the risk events happen.p (x h ) represents the average value of damage degree corresponding to the risk rank x h .Its range is 0 ≤ p (x h ) ≤ 1.

Discussion of the Work Done by Gao et al.
In the approach proposed by Gao et al., the uncertainty of BPA is measured by the probability mass assigned to the complete set, which is not a very effective quantification of uncertainty.Moreover, only the subjective weights of criteria have been considered, which makes the subjectivity of the assessment very large.Therefore, in the novel assessment approach proposed in this paper, we employ an uncertainty measure to more accurately quantify the uncertainty of BPA and transform the uncertainty into objective weights.In addition, the weighted average combination method of combining mass functions, which has a good performance of convergence, is applied to the risk assessment.The process of the novel network security risk assessment approach is shown as below.

The Novel Network Security Risk Assessment Approach Proposed in This Paper
The purpose of this paper is to propose a better approach of network security risk assessment.The process of the novel network security risk assessment approach can be divided into six steps, as depicted in Figure 2.

Establish a Hierarchical Structure Model
The establishment of hierarchical structure model is the premise of network security risk assessment.In this paper, there are three levels of the hierarchy structure model, as depicted in Figure 1 [25].

Make an Evaluation Expressed by BPA
According to the hierarchical structure of computer network security risk assessment, the evaluation of the network, specifically the risk values of bottom criteria, should be given by experts and be expressed by BPA.

Determine the Subjective and Objective Weights
Assume that the subjective weights of the criteria are given by experts, which are known in advance.The objective weights are determined by the uncertainty of the evaluation data.The calculation method is as follows.
Step1: Establish a hierarchical structure model for computer network security risk assessment Let Θ = {very low (VL), low (L), middle low (ML), middle (M), middle high (MH), high (H), very high (VH)} represent seven risk levels of network security assessment.For the bottom criteria, suppose the subjective weight and BPA of the criteria a ij are w ij and m ij , respectively (i = 1, 2, 3; j = 1, 2, . ..).By using Equation ( 13), the uncertainty of each piece of evidence (evaluation data), denoted as U ij (i = 1, 2, 3; j = 1, 2, . ..), can be calculated.In view of the larger uncertainty of evidence and the less useful information provided, the objective weight u ij can be obtained by:

Obtain Comprehensive Weights
In this part, subjective weights of criteria and objective weights of evaluation data are combined to obtain the comprehensive weights.That is to say, the final weights of bottom criteria consist of two parts: the subjective weights known in advance and the objective weights to consider the uncertainty of mass functions, which contributes to decreasing the negative influence of expert's extreme subjectivity on the evaluation data.The comprehensive weights are indicated by:

Use Weighted Average Combination Rule to Combine Mass Functions
Based on the comprehensive weights z ij and BPAs (m ij ) of the bottom criteria, the weighted average combination rule is used to combine the evidence in this layer.When the combination of evidence is finished, the results of the combination will be regarded as the mass functions (BPAs) of the middle level criteria.Similarly, we can calculate the comprehensive weights of criteria in this layer and combine the evidence to obtain the evaluation result, which is expressed by BPA.Besides, the uncertainty of the evaluation result can also be quantified by Equation (13).

Obtain the Risk Level of Computer Networks
Through above five steps, the BPA of network security risk assessment can be obtained.In this paper, by Equation ( 14), PPT is employed to convert the mass function into a probability distribution.Then, according to the principle of maximum membership, the risk level of computer networks is finally derived.

An Example of Network Security Risk Assessment
In this subsection, a numerical example from [25] is presented to illustrate the procedure of the proposed approach of evaluating network security.

Establish the Hierarchical Structure of Computer Networks
Considering communication, access and assets, three parts that are of great significance to computer network security, the hierarchical structure of computer network security risk assessment is established, as shown in Figure 1 [25].

Make an Evaluation Expressed by BPA
The BPAs of bottom criteria are given by experts, detailed in Table 2 [25].The subjective weights of criteria are given by experts in advance (see Table 3 [25]).For the bottom criteria, the uncertainty of each piece of evidence, denoted as U ij , is calculated by Equation ( 13), and the objective weights u ij are obtained by Equation ( 17) (see Table 4).Based on the subjective and objective weights of bottom criteria, the comprehensive weights are derived by Equation (18), detailed in Table 5.On the basis of BPAs (m ij ) of bottom criteria, along with the comprehensive weights z ij , the weighed average of evidence m i (i = 1, 2, 3) can be calculated by Equation (9).Then, we can use Equations ( 7) and ( 8) to combine the weighted average of evidence m 1 4 times to obtain m 1 .Similarly, we can derive m 2 and m 3 .Weighted average of evidence m i and the BPAs of the bottom criteria after combination are detailed in Tables 6 and 7.The BPAs of bottom criteria after combination can be viewed as the mass functions of middle level criteria.Similarly, the objective and comprehensive weights of these pieces of evidence can also be obtained (see Table 8).Then, the weighted average of evidence m is derived.After using Equations ( 7) and ( 8) to combine m 2 times, the combination result, denoted as m, which is also the mass function of network security risk assessment (see Table 9), is obtained.Meanwhile, the uncertainty of the evaluation result can be calculated by Equation (13), which is 0.0630 (quite small).Through the last five steps, the evaluation result, which is expressed by BPA, is given.Applying PPT to the evaluation, the risk level of computer networks can be determined.The probability distribution after PPT is detailed in Table 10.According to the principle of maximum membership, the risk level of this computer network is middle high (MH).Besides, the approach used in the study of [25] is also applied to compare with the approach proposed in this paper.As described in Figure 3, if the maximum membership principle is used to determine the risk level in these two approaches, they give the same assessment result, middle high.However, the approach proposed in this paper has a better performance of convergence, and the degree of evidence's support for middle high (MH) is greater.More importantly, the uncertainty of the evaluation result in the study of [25] can be obtained by Equation (13), which is 0.1336, far greater than that of this paper.
Herein, we also compare and discuss the assessment of each middle level criterion by using these two assessment approach.The corresponding assessment results are shown in Tables 7 and 11.Using the assessment approach proposed in this paper, the uncertainty of the evaluation results of a 1 , a 2 and a 3 can be obtained by using Equation (13), which is 0.1107, 0.1173 and 0.1450, respectively.In the approach proposed by Gao et al., the corresponding uncertainty is 0.1750, 0.1379 and 0.1953, respectively.Obviously, the use of our assessment approach can reduce the uncertainty of the assessment results.In addition, according to the evaluation data in Table 7, it can be seen that a 1 has the highest risk level, high (H).Therefore, more attention should be paid to a 1 to improve the overall network security.All the above illustrates that the approach proposed in this paper can effectively assess the security of computer networks, which is the purpose of our study.

The Analysis of the Sensitivity of the Proposed Method
In this part, to examine the robustness of the proposed approach, the sensitivity analysis of the proposed approach is done by changing the BPAs of some criteria.
For example, the evidence of a 15 and a 22 (abbreviated as m 15 and m 22 ) is changed, respectively, by assigning all the probability mass to the complete set Θ, which means maximizing the uncertainty and minimizing the useful information content.Then the evaluation result is calculated.The corresponding results are shown in Figures 4 and 5. From Figures 4 and 5, it can be seen that although the uncertainty of the evidence increases and the useful information content reduces, the approach proposed in this paper can still make the correct evaluation, which proves that the proposed assessment approach is robust.Besides, changes in the evidence of the criterion with the larger weight will have a greater influence on the assessment result, which accords with this fact.

Another Example of Network Security System Assessment
Herein, an example of assessing computer network security systems is presented.This assessment is implemented in [53] by using a model with two-tuple linguistic information.In this subsection, evaluation data expressed in linguistic information in [53] are converted into BPAs, and then, the novel assessment approach proposed in this paper is employed to assess network security systems.

Use the Assessment Approach Proposed in This Paper to Assess Network Security Systems
There are four alternative network security systems from different information technology companies, denoted as A i (i = 1, 2, 3, 4), for the military to select.The purpose of assessing these network security systems is to assist the decision-maker in making the best choice.The attributes used to evaluate these computer network security systems are denoted as G i (i = 1, 2, 3, 4, 5).
• According to the weights of three decision-makers, the evaluation data based on linguistic information are transformed into the probability distribution of linguistic variables.

•
By applying the uncertainty measure iTU I , the uncertainty of the probability distribution obtained in the previous step can be derived.Then, the uncertainty is used to discount the probability distribution to generate BPAs for evaluation.
The following gives an example to clearly illustrate the process of generating BPA for evaluation.
According to the decision matrices, for A 1 , the assessment of its desirability level under G 1 given by three decision-makers R i (i = 1, 2, 3) is s 5 , s 3 and s 1 , respectively.Then, the probability distribution of A 1 under G 1 is defined as: m (s 1 ) = 0.3341 m (s 3 ) = 0.3365 m (s 5 ) = 0.3294 By using Equation ( 13), the uncertainty of the probability distribution can be calculated as 0.1091.Let α = 1 − 0.1091 = 0.8909.Then, the final BPA for evaluation is defined as: Using the same method, the BPAs of A i (i = 1, 2, 3, 4) under attributes G i (i = 1, 2, 3, 4, 5) are calculated, as shown in Tables 12-15.After getting the BPAs for evaluation, the novel assessment approach proposed in this paper is applied to assess the desirability level of network security systems.For each network security system, the subjective weights of attributes G i (i = 1, 2, 3, 4, 5) are known, which is ω = {0.1, 0.15, 0.2, 0.3, 0.25}.By using Equations ( 13) and ( 17), the corresponding objective weights are derived.Then, the comprehensive weights of attributes G i (i = 1, 2, 3, 4, 5) are calculated by Equation (18) (see Table 16).Using the weighted average combination rule to combine the BPAs of these five attributes, the evaluation results of network security systems are obtained (expressed by BPA), as shown in Table 17.

Network Security System The Evaluation Results (Expressed by BPA)
A 1 m(s 0 ) = 0.0000, m(s 1 ) = 0.0000, m(s 2 ) = 0.0237, m(s 3 ) = 0.0030, m(s 4 ) = 0.2071, m(s 5 ) = 0.0625, m(s 6 ) = 0.7306 In order to rank these four network security systems, defuzzification is performed to get the total score for each network security system in this example.Suppose in the linguistic term set S = {s 0 , s 1 , s 2 , s 3 , s 4 , s 5 , s 6 }, every linguistic variable is represented by a trapezoidal fuzzy number given in Table 18 and graphically presented as Figure 6.The centroid defuzzification approach is used, and the defuzzified values for each linguistic variable are P (s i ) = {P (s 0 ) , P (s 1 ) , • • • , P (s 6 )} = {0.7778, 2, 3.5, 5, 6.5, 8, 9.2222}.After obtaining the evaluation results of network security systems expressed by BPA, PPT is carried out.In this example, since the probability mass of BPA is all assigned to singleton sets, BetP (s i ) = m (s i ) , i = 0, 1, • • • , 6.Then, the total scores for these network security systems can be obtained by Equation (19), which are 8.6818, 2.6929, 5.0611, 7.2044, respectively.Therefore, the desirability level of these four network security systems is ranked as A 1 > A 4 > A 3 > A 2 , and the most desirable alternative is A 1 , which is consistent with results given in [53].That is to say, the novel assessment approach proposed in this paper is effective and can be applied to decision-making.In this part, the assessment approach proposed in [25] is also employed to assess network security systems.The evaluation results (expressed by BPA) and the total scores of network security systems are shown in Table 19.From the total scores given by the assessment approach proposed in [25], desirability level of these four network security systems is ranked as , which is also consistent with the results given in [53].
Table 19.The evaluation results by using the assessment approach in [25].

Network Security System The Total
However, for A 1 , A 2 and A 4 , our novel assessment approach gives less uncertainty in the assessment results (BPA) than that of the assessment approach proposed in [25].By using our approach, the uncertainty of the evaluation results (expressed by BPA) of A 1 , A 2 and A 4 can be obtained by Equation (13), which is 0.0698, 0.0478 and 0.0939, respectively; while the corresponding uncertainty by using the approach proposed by Gao et al. is 0.1001, 0.0949 and 0.1195, respectively.
For A 3 , these two assessment approaches give large differences in the assessment results (see Tables 17 and 19).In our approach, the comprehensive weights used for evaluation are the combination of subjective weights and objective weights.It can be seen from Table 16 that after considering the uncertainty of each BPA and transforming it into objective weights, the comprehensive weights of attributes G 2 ∼G 5 of A 3 have undergone significant changes.Among them, the weights of G 3 and G 4 are significantly increased, while the weights of G 2 and G 5 are significantly reduced, which leads to the larger probability mass assigned to s 1 and s 6 .That is to say, in our assessment approach, the uncertainty of the evaluation data makes the evaluation results more reasonable by adjusting the comprehensive weights.Therefore, it is more reasonable to assess A 3 by using the approach proposed in this paper.

The Ranking of Network Security Systems When Weights of Attributes Change
Herein, increase the weight (subjective weights) of G 1 , and reduce that of G 5 , while the weights of other attributes are unchanged, to observe the changes of the evaluation results of the network security system.The corresponding evaluation results are shown in Table 20 and Figure 7. Through Table 20 and Figure 7, we can make the following analysis.

•
The score of A 1 fluctuates at eight points and always ranks first, indicating that A 1 is excellent in both G 1 and G 5 .

•
When the weights of G 1 and G 5 are changed, the score of A 4 decreases obviously.When weight(G 1 , G 5 ) = (0.3, 0.05), A 4 ranks third, with a very low score, indicating that A 4 is worse in G 1 and that more attention should be paid to G 1 .

•
Similarly, the score of A 3 also decreases with the change of the weights of G 1 and G 5 , which indicates that there is a larger gap between A 3 and A 1 under G 1 than that under G 5 .

•
The score of A 2 becomes higher and higher, indicating that more efforts should be made in G 5 to improve the overall situation of the network security system.

Conclusions
The contribution of this paper is to propose an effective approach of network security risk assessment.One of the crucial problems in the network security risk assessment is how to deal with uncertainty.In this paper, based on the hierarchical structure of network security risk assessment, an uncertainty measure iTU I is applied to quantify the uncertainty of the BPAs of criteria to obtain objective weights, and then, the comprehensive weights are obtained.Besides, the weighted average combination rule is adopted to combine the evidence from bottom to top.According to the probability distribution after using PPT and the principle of maximum membership, the risk level of computer networks can be determined.
Through analyzing the uncertainty of the evaluation results in the two illustrative examples, it is easy to find that the assessment approach proposed in this paper can significantly reduce the uncertainty of the evaluation result and give a clear and correct assessment.In addition, the second example also illustrates that our risk assessment approach of combining subjective and objective weights can be used in the decision-making field.Therefore, the novel risk assessment approach proposed in this paper is a very effective approach for assessing network security and for decision-making.

Figure 3 .
Figure 3.Comparison of evaluation results of different methods.

Figure 4 .Figure 5 .
Figure 4. Comparison of evaluation results before and after changing m 15 .

4. 2 . 2 .
The Assessment of Network Security Systems by Using the Approach Proposed by Gao et al.

Figure 7 .
Figure 7.The ranking of the network security system.

Table 3 .
Subjective weights of criteria.

Table 4 .
Objective weights of bottom criteria.

Table 5 .
Comprehensive weights of bottom criteria.

Criteria Subjective Weights Objective Weights Comprehensive Weights
4.1.5.Use Weighted Average Combination Rule to Combine the Mass Functions

Table 6 .
The weighted average of evidence of bottom criteria.

Table 7 .
The BPAs of bottom criteria after combination.

Table 8 .
Objective and comprehensive weights of middle level criteria.

Table 9 .
The weighted average evidence and combination result of middle level criteria.

Table 10 .
The probability distribution of the evaluation result.

Table 16 .
The comprehensive weights of the attributes of A i .

Table 17 .
The evaluation results (expressed by BPA).

Table 18 .
Linguistic variables for the evaluation.

Table 20 .
The ranking of the network security system.