Integrating PCA and DEA techniques for strategic assessment of network security

Network security is paramount in safeguarding the integrity of computer networks and the data they host. The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network. A robust network security strategy deploys various solutions to...

Full description

Saved in:
Bibliographic Details
Main Authors: Reza Rasinojehdehi, Seyyed Najafi
Format: Article
Language:English
Published: REA Press 2023-03-01
Series:Computational Algorithms and Numerical Dimensions
Subjects:
Online Access:https://www.journal-cand.com/article_183772_f41fb2c13f59071e5e44440fff46a0a6.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832580040647245824
author Reza Rasinojehdehi
Seyyed Najafi
author_facet Reza Rasinojehdehi
Seyyed Najafi
author_sort Reza Rasinojehdehi
collection DOAJ
description Network security is paramount in safeguarding the integrity of computer networks and the data they host. The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network. A robust network security strategy deploys various solutions to shield data within networks, safeguarding both users and organizations from potential threats. This paper introduces a novel approach to evaluating computer network security using Data Envelopment Analysis (DEA), a mathematical method designed to measure the performance of Decision-Making Units (DMUs) employing identical inputs to yield identical outputs. We present a practical application of DEA to assess the security of 10 distinct networks, treating them as DMUs. The resulting performance measurements allow us to classify computer network security into four levels: "terribly insecure," "insecure," "safe," and "very safe. To optimize the discriminating power of DEA, we employ Principal Component Analysis (PCA) to reduce the number of inputs and outputs. It not only enhances the precision of our evaluation but also ensures that the number of DMUs remains well-suited to the analysis. As a rule of thumb, the number of DMUs should be at least three times larger than the sum of the numbers of inputs and outputs to maintain DEA's discriminating power. Through the combined application of DEA and PCA, this research contributes a comprehensive and efficient method for evaluating and classifying computer network security, providing valuable insights for enhancing overall network resilience against cyber threats.
format Article
id doaj-art-dc0bb252b28c496b9a80f685235aa66c
institution Kabale University
issn 2980-7646
2980-9320
language English
publishDate 2023-03-01
publisher REA Press
record_format Article
series Computational Algorithms and Numerical Dimensions
spelling doaj-art-dc0bb252b28c496b9a80f685235aa66c2025-01-30T11:21:28ZengREA PressComputational Algorithms and Numerical Dimensions2980-76462980-93202023-03-0121233410.22105/cand.2023.424893.1076183772Integrating PCA and DEA techniques for strategic assessment of network securityReza Rasinojehdehi0Seyyed Najafi1Department of Industrial Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran.Department of Industrial Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran.Network security is paramount in safeguarding the integrity of computer networks and the data they host. The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network. A robust network security strategy deploys various solutions to shield data within networks, safeguarding both users and organizations from potential threats. This paper introduces a novel approach to evaluating computer network security using Data Envelopment Analysis (DEA), a mathematical method designed to measure the performance of Decision-Making Units (DMUs) employing identical inputs to yield identical outputs. We present a practical application of DEA to assess the security of 10 distinct networks, treating them as DMUs. The resulting performance measurements allow us to classify computer network security into four levels: "terribly insecure," "insecure," "safe," and "very safe. To optimize the discriminating power of DEA, we employ Principal Component Analysis (PCA) to reduce the number of inputs and outputs. It not only enhances the precision of our evaluation but also ensures that the number of DMUs remains well-suited to the analysis. As a rule of thumb, the number of DMUs should be at least three times larger than the sum of the numbers of inputs and outputs to maintain DEA's discriminating power. Through the combined application of DEA and PCA, this research contributes a comprehensive and efficient method for evaluating and classifying computer network security, providing valuable insights for enhancing overall network resilience against cyber threats.https://www.journal-cand.com/article_183772_f41fb2c13f59071e5e44440fff46a0a6.pdfdata envelopment analysisprincipal component analysiscomputer network securitydecision-making unit
spellingShingle Reza Rasinojehdehi
Seyyed Najafi
Integrating PCA and DEA techniques for strategic assessment of network security
Computational Algorithms and Numerical Dimensions
data envelopment analysis
principal component analysis
computer network security
decision-making unit
title Integrating PCA and DEA techniques for strategic assessment of network security
title_full Integrating PCA and DEA techniques for strategic assessment of network security
title_fullStr Integrating PCA and DEA techniques for strategic assessment of network security
title_full_unstemmed Integrating PCA and DEA techniques for strategic assessment of network security
title_short Integrating PCA and DEA techniques for strategic assessment of network security
title_sort integrating pca and dea techniques for strategic assessment of network security
topic data envelopment analysis
principal component analysis
computer network security
decision-making unit
url https://www.journal-cand.com/article_183772_f41fb2c13f59071e5e44440fff46a0a6.pdf
work_keys_str_mv AT rezarasinojehdehi integratingpcaanddeatechniquesforstrategicassessmentofnetworksecurity
AT seyyednajafi integratingpcaanddeatechniquesforstrategicassessmentofnetworksecurity