The model of information security risk assessment based on advanced evidence theory

被引:2
|
作者
Qing H. [1 ]
Qingsheng X. [1 ]
Shaobo L. [1 ]
机构
[1] Key Laboratory of Advanced Manufacturing Technology, Ministry of Education, Guizhou University, Guiyang, 50003, Guizhou
关键词
Combination rule; Evidence theory; Information security; Risk assessment;
D O I
10.1007/s13198-016-0424-4
中图分类号
学科分类号
摘要
With regard to nonlinearity and uncertainty in information security risk assessment, and on the foundation of hierarchical structure of information security risk assessment, the paper proposed a model of information security risk assessment based on advanced D–S evidence theory. In terms of the extent of danger of various risk factors in the system, and through the advanced Dempster combination rule, the paper obtained risk values of the system by combining the assignment of basic probability of various risk factors in the index system. The simulative results proved that the method herein was free from disadvantages of existing assessment methods that had great randomness and fuzzy conclusion, and was more convergent and self-adaptive. © 2016, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.
引用
收藏
页码:2030 / 2035
页数:5
相关论文
共 50 条
  • [31] On the role of the Facilitator in information security risk assessment
    Lizzie Coles-Kemp
    Richard E. Overill
    Journal in Computer Virology, 2007, 3 (2): : 143 - 148
  • [32] An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process
    Liu Dong-liang
    Yang Shi-song
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 874 - 877
  • [33] Campus Network Information Security Risk Assessment Based on FAHP and Matter Element Model
    Geng, Fangfang
    Ruan, Xiaolong
    INTELLIGENT COMPUTING METHODOLOGIES, ICIC 2017, PT III, 2017, 10363 : 298 - 306
  • [34] Classified Information System Security Risk Assessment Model of the Research
    Peng, Chong
    Shao, Liping
    2015 INTERNATIONAL CONFERENCE ON LOGISTICS, INFORMATICS AND SERVICE SCIENCES (LISS), 2015,
  • [35] Risk Assessment of Enterprises Information Security Based on Fuzzy Set and Entropy Weight
    Wang, Yi
    Yuan, Jia-hang
    Zhang, Jian-ye
    Li, Cun-bin
    4TH INTERNATIONAL CONFERENCE ON ECONOMICS AND MANAGEMENT (ICEM), 2017, : 337 - 342
  • [36] A new, evidence-based, theory for knowledge reuse in security risk analysis
    Labunets, Katsiaryna
    Massacci, Fabio
    Paci, Federica
    Tuma, Katja
    EMPIRICAL SOFTWARE ENGINEERING, 2023, 28 (04)
  • [37] A new, evidence-based, theory for knowledge reuse in security risk analysis
    Katsiaryna Labunets
    Fabio Massacci
    Federica Paci
    Katja Tuma
    Empirical Software Engineering, 2023, 28
  • [38] Information security risk analysis model based on entropy
    Tang, Y. L.
    Xu, G. A.
    Niu, Y. X.
    Yang, Y. X.
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1146 - 1150
  • [39] The Research of Information Security Risk Assessment Method Based on AHP
    Xu, Ning
    Zhao, DongMei
    SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 575 - 580
  • [40] Risk Assessment for Information Security Based on Fuzzy Membership Matrix
    Bai, Yan
    Yao, Zhong
    Li, Hong
    Zhang, Yong-Qiang
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 547 - +