Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method

被引:8
|
作者
Xu, Wenshu [1 ]
Lin, Mingwei [1 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 77卷 / 01期
关键词
Multi-criteria decision-making; distance measure; probabilistic linguistic term sets; industrial control system; information security assessment; RISK-ASSESSMENT; ENTROPY; SETS;
D O I
10.32604/cmc.2023.041475
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial control systems (ICSs) are widely used in various fields, and the information security problems of ICSs are increasingly serious. The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts. Thus, this paper introduces the probabilistic linguistic term sets (PLTSs) to model the evaluation information of experts. Meanwhile, we propose a probabilistic linguistic multi-criteria decision-making (PL-MCDM) method to solve the information security assessment problem of ICSs. Firstly, we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods. Secondly, we use the Best Worst Method (BWM) method and Criteria Importance Through Inter-criteria Correlation (CRITIC) method to obtain the subjective weights and objective weights, which are used to derive the combined weights. Thirdly, we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje (PL-VIKOR) method. Finally, we apply the proposed method to solve the information security assessment problem of ICSs. When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisao Iterativa Multicriterio (PL-TODIM) method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution (PL-TOPSIS) method, the case example shows that the proposed method can provide more reasonable ranking results. By evaluating and ranking the information security level of different ICSs, managers can identify problems in time and guide their work better.
引用
收藏
页码:199 / 222
页数:24
相关论文
共 50 条
  • [21] Multidimensional Quality Evaluation of Graduate Thesis: Based on the Probabilistic Linguistic MABAC Method
    Luo, Yuyan
    Zhang, Xiaoxu
    Tong, Tao
    Qin, Yong
    Yang, Zheng
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023, 137 (02): : 2049 - 2076
  • [22] Multi-criteria outranking method based on probability distribution with probabilistic linguistic information
    Peng, Hong-gang
    Wang, Jian-qiang
    Zhang, Hong-yu
    COMPUTERS & INDUSTRIAL ENGINEERING, 2020, 141
  • [23] Extension and Unascertained Measure for Evaluation of Information Systems Security
    Shi, Huawang
    Deng, Yong
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 190 - +
  • [24] An Information Security Assessments Framework for Power Control Systems
    Wang, Yufei
    Zhang, Tao
    Ma, Yuanyuan
    Zhang, Bo
    ENERGY AND POWER TECHNOLOGY, PTS 1 AND 2, 2013, 805-806 : 980 - 984
  • [25] METHODS OF ESTIMATION OF RISKS FOR CONTROL SYSTEMS OF INFORMATION SECURITY
    Akhmetov, B. S.
    Korchenko, A. G.
    Kazmirchuk, S. V.
    Zhekambayeva, M. N.
    BULLETIN OF THE NATIONAL ACADEMY OF SCIENCES OF THE REPUBLIC OF KAZAKHSTAN, 2015, (06): : 23 - 38
  • [26] Information-Theoretic Security in Stochastic Control Systems
    Venkitasubramaniam, Parv
    Yao, Jiyun
    Pradhan, Parth
    PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1914 - 1931
  • [27] Information Security Factors in the Implementation of Industrial Control System into Cloud Environment
    Ibrahim, Asma Zubaida M.
    Yahaya, Jamaiah H.
    ADVANCED SCIENCE LETTERS, 2018, 24 (07) : 5239 - 5242
  • [28] An AutoML-based security defender for industrial control systems
    Vasan, Danish
    Alqahtani, Ebtesam Jubran S.
    Hammoudeh, Mohammad
    Ahmed, Adel F.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 47
  • [29] Exploration of Quantum Cryptography Security Applications for Industrial Control Systems
    Li H.
    Dong Y.
    Zhang Y.
    Wang H.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [30] An Evaluation of Cyber Threats to Industrial Control Systems
    Vavra, Jan
    Hromada, Martin
    INTERNATIONAL CONFERENCE ON MILITARY TECHNOLOGIES (ICMT 2015), 2015, : 369 - 373