An information systems security risk assessment model under uncertain environment

被引:50
作者
Feng, Nan [1 ]
Li, Minqiang [1 ]
机构
[1] Tianjin Univ, Dept Informat Management & Management Sci, Sch Management, Tianjin 300072, Peoples R China
基金
中国国家自然科学基金;
关键词
Information systems security; Risk assessment; Evidence theory; Fuzzy measure; Evidential consistency; BELIEF FUNCTIONS;
D O I
10.1016/j.asoc.2010.06.005
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Given there is a great deal of uncertainty in the process of information systems security (ISS) risk assessment, the handling of uncertainty is of great significance for the effectiveness of risk assessment. In this paper, we propose an ISS risk assessment model based on the improved evidence theory. Firstly, we establish the ISS index system and quantify index weights, based on which the evidential diagram is constructed. To deal with the uncertain evidence found in the ISS risk assessment, this model provides a new way to define the basic belief assignment in fuzzy measure. Moreover, the model also provides a method of testing the evidential consistency, which can reduce the uncertainty derived from the conflicts of evidence. Finally, the model is further demonstrated and validated via a case study, in which sensitivity analysis is employed to validate the reliability of the proposed model. (C) 2010 Elsevier B. V. All rights reserved.
引用
收藏
页码:4332 / 4340
页数:9
相关论文
共 41 条
[11]   Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles [J].
Grunske, Lars ;
Joyce, David .
JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (08) :1327-1345
[12]   Approximate reasoning and evidence theory [J].
Guan, JW ;
Bell, DA .
INFORMATION SCIENCES, 1997, 96 (3-4) :207-235
[13]  
HARDMAN DK, 2000, EXPERT SYST, V14, P24
[14]  
Huanchun Y., 2010, J SOFTWARE, V5, P99
[15]  
Jin Chao-guang, 2003, Journal of Dalian University of Technology, V43, P97
[16]  
Joussleme A.-L., 2001, Information Fusion, V2, P91, DOI 10.1016/S1566-2535(01)00026-4
[17]   An integrative study of information systems security effectiveness [J].
Kankanhalli, A ;
Teo, HH ;
Tan, BCY ;
Wei, KK .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2003, 23 (02) :139-154
[18]   Information systems security policies: a contextual perspective [J].
Karyda, M ;
Kiountouzis, E ;
Kokolakis, S .
COMPUTERS & SECURITY, 2005, 24 (03) :246-260
[19]   Understanding the value of countermeasure portfolios in information systems security [J].
Kumar, Ram L. ;
Park, Sungjune ;
Subramaniam, Chandrasekar .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) :241-279
[20]   Large engineering project risk management using a Bayesian belief network [J].
Lee, Eunchang ;
Park, Yongtae ;
Shin, Jong Gye .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (03) :5880-5887