An Exploration of Network Security Based on Entropy Weight Method and Fuzzy Comprehensive Evaluation Modeling
DOI:
https://doi.org/10.54097/b7t0ps31Keywords:
Cybersecurity, Entropy Weighting Method, Fuzzy Comprehensive Evaluation ModelAbstract
This paper focuses on cybercrime characteristics and cybersecurity assessment, with the aim of understanding the global distribution of cybercrime and conducting modeling analysis. In terms of research methodology, data on cybercrime rates, frustration rates, success rates, reporting rates and prosecution rates of many countries and regions such as the U.S., China and the U.K. are collected; entropy weighting method (EWM) is used to calculate social coefficients and analyze the relationship between socio-economic factors and crime rates; and fuzzy comprehensive evaluation model is used to establish a comprehensive evaluation model for cybersecurity. The strengths of the study are that it reveals the characteristics of cybercrime in different countries and regions in a more comprehensive way through multifaceted data and models, and the model constructed can comprehensively assess the cybersecurity situation of each country, and the reliability of the model is verified by sensitivity analysis, which makes it clear that the policy score and the social score have a greater impact on the cybercrime rate.
Downloads
References
[1] Han Chengzhe. Analysis of network information security protection strategy and evaluation algorithm [J]. Network Security Technology and Application, 2025, (01):41-42.
[2] Chen Lu. Application of entropy weight method in information security risk assessment [J]. Information Systems Engineering, 2021, (09):62-64.
[3] Zhou Jie. Research on the application of fuzzy comprehensive evaluation model in network system security assessment [J]. Network Security Technology and Application, 2013, (12):78-79.
[4] Lu Chenxi, Zhou Ming. Research on cross-border cybercrime governance in China under the perspective of data sovereignty [J/OL]. Journal of Jiangxi Police College, 1-7 [2025-02-15]. http://kns.cnki.net/kcms/detail/36.1316.D.20241224.0913.002.html.
[5] Zhang Yupeng, Lu Xiaowen, Lu Mingxin, et al. A Comparative Study of Chinese and American Cybersecurity Policies Based on the Three-Dimensional Framework of “Evolution-Tool-Theme” [J]. Journal of Intelligence, 2025, 44(02):124-135.
[6] Wang Wenzhi. Characteristics of computer network crime and prevention strategy analysis [J]. Law and Society, 2021, (19): 191-192. DOI: 10.19387/j.cnki.1009-0592.2021.07.083.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Journal of Computer Science and Artificial Intelligence

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.