The model of information security risk assessment based on advanced evidence theory

被引:2
|
作者
Qing H. [1 ]
Qingsheng X. [1 ]
Shaobo L. [1 ]
机构
[1] Key Laboratory of Advanced Manufacturing Technology, Ministry of Education, Guizhou University, Guiyang, 50003, Guizhou
关键词
Combination rule; Evidence theory; Information security; Risk assessment;
D O I
10.1007/s13198-016-0424-4
中图分类号
学科分类号
摘要
With regard to nonlinearity and uncertainty in information security risk assessment, and on the foundation of hierarchical structure of information security risk assessment, the paper proposed a model of information security risk assessment based on advanced D–S evidence theory. In terms of the extent of danger of various risk factors in the system, and through the advanced Dempster combination rule, the paper obtained risk values of the system by combining the assignment of basic probability of various risk factors in the index system. The simulative results proved that the method herein was free from disadvantages of existing assessment methods that had great randomness and fuzzy conclusion, and was more convergent and self-adaptive. © 2016, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.
引用
收藏
页码:2030 / 2035
页数:5
相关论文
共 50 条
  • [41] Information security risk assessment based on G-ANP
    Zhao, G. (zhaogang@bistu.edu.cn), 1761, Tsinghua University (53):
  • [42] Information Security Risk Assessment Technology of Cyberspace: a Review
    Li Qianmu
    Zhang Hong
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11A): : 4677 - 4683
  • [43] A new quantitative approach for information security risk assessment
    Asosheh, Abbas
    Dehmoubed, Bijan
    Khani, Amir
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 222 - +
  • [44] An Improved Risk Assessment Method for SCADA Information Security
    Markovic-Petrovic, J. D.
    Stojanovic, M. D.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 69 - 72
  • [45] Dynamic Interpretation Approaches for Information Security Risk Assessment
    Alhajri, Reem M.
    Alsunaidi, Shikah J.
    Zagrouba, Rachid
    Almuhaideb, Abdullah M.
    Alqahtani, Mohammed A.
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 453 - 458
  • [46] Index Reduction for Information systems security risk assessment Based on Rough Set Theory and Hierarchic Analysis
    Fu, Yu
    Wu, Xiaoping
    Zhu, Tingting
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 370 - 374
  • [47] Information asset valuation method for information technology security risk assessment
    Foroughi, Farhad
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 576 - 581
  • [48] Information security risk analysis model using fuzzy decision theory
    Henriques de Gusmao, Ana Paula
    Camara e Silva, Lucio
    Silva, Maisa Mendonca
    Poleto, Thiago
    Cabral Seixas Costa, Ana Paula
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (01) : 25 - 34
  • [49] Study on Risk Assessment of Network Security Based on Game Theory
    Xu Yanli
    Wang Lingling
    ADVANCED MATERIALS SCIENCE AND TECHNOLOGY, PTS 1-2, 2011, 181-182 : 799 - +
  • [50] Research on Assessment Model of Information System Security Based on Various Security Factors
    林梦泉
    朱赟
    王强民
    李建华
    JournalofShanghaiJiaotongUniversity, 2007, (03) : 405 - 409