An information systems security risk assessment model under uncertain environment

被引:50
作者
Feng, Nan [1 ]
Li, Minqiang [1 ]
机构
[1] Tianjin Univ, Dept Informat Management & Management Sci, Sch Management, Tianjin 300072, Peoples R China
基金
中国国家自然科学基金;
关键词
Information systems security; Risk assessment; Evidence theory; Fuzzy measure; Evidential consistency; BELIEF FUNCTIONS;
D O I
10.1016/j.asoc.2010.06.005
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Given there is a great deal of uncertainty in the process of information systems security (ISS) risk assessment, the handling of uncertainty is of great significance for the effectiveness of risk assessment. In this paper, we propose an ISS risk assessment model based on the improved evidence theory. Firstly, we establish the ISS index system and quantify index weights, based on which the evidential diagram is constructed. To deal with the uncertain evidence found in the ISS risk assessment, this model provides a new way to define the basic belief assignment in fuzzy measure. Moreover, the model also provides a method of testing the evidential consistency, which can reduce the uncertainty derived from the conflicts of evidence. Finally, the model is further demonstrated and validated via a case study, in which sensitivity analysis is employed to validate the reliability of the proposed model. (C) 2010 Elsevier B. V. All rights reserved.
引用
收藏
页码:4332 / 4340
页数:9
相关论文
共 41 条
[1]  
Alter S., 2004, COMMUN ASSOC INF SYS, V14, P1, DOI 10.17705/1CAIS.01401
[2]   Ensembling evidential k-nearest neighbor classifiers through multi-modal perturbation [J].
Altincay, Hakan .
APPLIED SOFT COMPUTING, 2007, 7 (03) :1072-1083
[3]  
[Anonymous], INFORM MANAGEMENT CO
[4]  
[Anonymous], P 7 C UNC ART INT
[5]   Information security and risk management [J].
Bodin, Lawrence D. ;
Gordon, Lawrence A. ;
Loeb, Martin P. .
COMMUNICATIONS OF THE ACM, 2008, 51 (04) :64-68
[6]  
Chen DM, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND BIOMIMETICS, VOLS 1-5, P93
[7]  
DEMPSTER AP, 1968, J ROY STAT SOC B, V30, P205
[8]  
Deng ZJ, 2005, LECT NOTES COMPUT SC, V3568, P560
[9]   Risk analysis modelling with the use of fuzzy logic [J].
deRu, WG ;
Eloff, JHP .
COMPUTERS & SECURITY, 1996, 15 (03) :239-248
[10]   BBN-based software project risk management [J].
Fan, CF ;
Yu, YC .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (02) :193-203