Application of Multicriteria Methods for Improvement of Information Security Metrics

被引:1
|
作者
Abdiraman, Aliya [1 ]
Goranin, Nikolaj [2 ]
Balevicius, Simas [2 ]
Nurusheva, Assel [1 ]
Tumasoniene, Inga [3 ]
机构
[1] LN Gumilyov Eurasian Natl Univ, Fac Informat Technol, Dept Informat Secur, Astana KZ-010008, Kazakhstan
[2] Vilnius Gediminas Tech Univ, Fac Fundamental Sci, Dept Informat Syst, LT-08412 Vilnius, Lithuania
[3] Vilnius Gediminas Tech Univ, Fac Fundamental Sci, Dept Informat Technol, LT-08412 Vilnius, Lithuania
关键词
MCDM; fuzzy; TOPSIS; WASPAS; AHP; information security metrics; malicious program code; TOPSIS METHOD; FUZZY AHP;
D O I
10.3390/su15108114
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Metrics are a set of numbers that are used to obtain information about the operation of a process or system. In our case, metrics are used to assess the level of information security of information and communication infrastructure facilities. Metrics in the field of information security are used to quantify the possibility of damage due to unauthorized hacking of an information system, which make it possible to assess the cyber sustainability of the system. The purpose of the paper is to improve information security metrics using multicriteria decision-making methods (MCDM). This is achieved by proposing aggregated information security metrics and evaluating the effectiveness of their application. Classical information security metrics consist of one size or one variable. We obtained the total value by adding at least two different metrics and evaluating the weighting factors that determine their importance. This is what we call aggregated or multicriteria metrics of information security. Consequently, MCDM methods are applied to compile aggregated metrics of information security. These are derived from expert judgement and are proposed for the three management domains of the ISO/IEC 27001 information security standard. The proposed methods for improving cyber sustainability metrics are also relevant to information security metrics. Using AHP, WASPAS and Fuzzy TOPSIS methods to solve the problem, the weights of classical metrics are calculated and three aggregated metrics are proposed. As a result, to confirm the fulfilment of the task of improving information security metrics, a verification experiment is conducted, during which aggregated and classical information security metrics are compared. The experiment shows that the use of aggregated metrics can be a more convenient and faster process and higher intelligibility is also achieved.
引用
收藏
页数:34
相关论文
共 50 条
  • [31] Security Coverage Metrics for Information Flow at the System Level
    Coskun, Ece Nur Demirhan
    Ahmadi-Pour, Sallar
    Hassan, Muhammad
    Drechsler, Rolf
    29TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2024, 2024, : 945 - 950
  • [32] Security Qualitative Metrics for Open Web Application Security Project Compliance
    Sonmez, Ferda Ozdemir
    10TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2019) / THE 2ND INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40 2019) / AFFILIATED WORKSHOPS, 2019, 151 : 998 - 1003
  • [33] Application of Security Metrics in Auditing Computer Network Security: A Case Study
    Premaratne, Upeka
    Samarabandu, Jagath
    Sidhu, Tarlochan
    Beresh, Bob
    Tan, Jian-Cheng
    2008 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS), 2008, : 448 - +
  • [34] NUCLEAR WASTE MANAGEMENT - AN APPLICATION OF THE MULTICRITERIA PROMETHEE METHODS
    BRIGGS, T
    KUNSCH, PL
    MARESCHAL, B
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 1990, 44 (01) : 1 - 10
  • [35] APPLICATION OF MULTICRITERIA CHOICE-METHODS IN ASSESSING EUTROPHICATION
    MORIKI, A
    KARYDIS, M
    ENVIRONMENTAL MONITORING AND ASSESSMENT, 1994, 33 (01) : 1 - 18
  • [36] APPLICATION OF MULTICRITERIA OPTIMIZACION METHODS IN THE DESIGN OF ROAD EMBANKMENTS
    Manic, Nazim
    Hot, Izet
    Lukic, Dragan
    Pantic, Mladen
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2016, 23 (06): : 1665 - 1672
  • [37] Expert Methods Application to Assess Information Security Threats Impact in the Military Sphere
    Snitsarenko, Petro
    Zahorka, Oleksii
    Koretskyi, Andrii
    Sarychev, Yurii
    Tkachenko, Volodymyr
    15TH INTERNATIONAL CONFERENCE ON ADVANCED TRENDS IN RADIOELECTRONICS, TELECOMMUNICATIONS AND COMPUTER ENGINEERING (TCSET - 2020), 2020, : 41 - 45
  • [38] APPLIED INFORMATION MANAGEMENT - MANAGEMENT REFERENCE MODEL - SECURITY METRICS
    Doucek, Petr
    IDIMT-2008: MANAGING THE UNMANAGEABLE, 2008, 25 : 81 - 106
  • [39] Approach of routing metrics formation based on information security risk
    Snigurov, Arkadij
    Chakryan, Vadim
    2013 12TH INTERNATIONAL CONFERENCE ON THE EXPERIENCE OF DESIGNING AND APPLICATION OF CAD SYSTEMS IN MICROELECTRONICS (CADSM 2013), 2013, : 339 - 340
  • [40] Developing information security metrics and measures for risk assessment of an organization
    Manuja, Prashant
    Shekhawat, Rajveer Singh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04): : 1195 - 1202