Application of Multicriteria Methods for Improvement of Information Security Metrics

被引:1
|
作者
Abdiraman, Aliya [1 ]
Goranin, Nikolaj [2 ]
Balevicius, Simas [2 ]
Nurusheva, Assel [1 ]
Tumasoniene, Inga [3 ]
机构
[1] LN Gumilyov Eurasian Natl Univ, Fac Informat Technol, Dept Informat Secur, Astana KZ-010008, Kazakhstan
[2] Vilnius Gediminas Tech Univ, Fac Fundamental Sci, Dept Informat Syst, LT-08412 Vilnius, Lithuania
[3] Vilnius Gediminas Tech Univ, Fac Fundamental Sci, Dept Informat Technol, LT-08412 Vilnius, Lithuania
关键词
MCDM; fuzzy; TOPSIS; WASPAS; AHP; information security metrics; malicious program code; TOPSIS METHOD; FUZZY AHP;
D O I
10.3390/su15108114
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Metrics are a set of numbers that are used to obtain information about the operation of a process or system. In our case, metrics are used to assess the level of information security of information and communication infrastructure facilities. Metrics in the field of information security are used to quantify the possibility of damage due to unauthorized hacking of an information system, which make it possible to assess the cyber sustainability of the system. The purpose of the paper is to improve information security metrics using multicriteria decision-making methods (MCDM). This is achieved by proposing aggregated information security metrics and evaluating the effectiveness of their application. Classical information security metrics consist of one size or one variable. We obtained the total value by adding at least two different metrics and evaluating the weighting factors that determine their importance. This is what we call aggregated or multicriteria metrics of information security. Consequently, MCDM methods are applied to compile aggregated metrics of information security. These are derived from expert judgement and are proposed for the three management domains of the ISO/IEC 27001 information security standard. The proposed methods for improving cyber sustainability metrics are also relevant to information security metrics. Using AHP, WASPAS and Fuzzy TOPSIS methods to solve the problem, the weights of classical metrics are calculated and three aggregated metrics are proposed. As a result, to confirm the fulfilment of the task of improving information security metrics, a verification experiment is conducted, during which aggregated and classical information security metrics are compared. The experiment shows that the use of aggregated metrics can be a more convenient and faster process and higher intelligibility is also achieved.
引用
收藏
页数:34
相关论文
共 50 条
  • [41] Improvement of Information System Security Risk Management
    Abbass, Wissam
    Baina, Amine
    Bellafkih, Mostafa
    2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 182 - 187
  • [42] Security of improvement on methods for protecting password transmission
    Yang, CC
    Chang, TY
    Hwang, MS
    INFORMATICA, 2003, 14 (04) : 551 - 558
  • [43] Application of multicriteria decision-making methods for the optimal evacuation
    Brezina, Daniel
    Simak, Ladislav
    Hudakova, Maria
    Masar, Matej
    13TH INTERNATIONAL SCIENTIFIC CONFERENCE ON SUSTAINABLE, MODERN AND SAFE TRANSPORT (TRANSCOM 2019), 2019, 40 : 963 - 969
  • [44] Application of Java']Java Security Architecture in Information Security
    Shen Guicheng
    Zheng Xuefeng
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE OF MODELLING AND SIMULATION, VOL III: MODELLING AND SIMULATION IN ELECTRONICS, COMPUTING, AND BIO-MEDICINE, 2008, : 66 - 69
  • [45] Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security
    Demidov, R. A. Z.
    Pechenkin, A. I.
    Zegzhda, P. D.
    Kalinin, M. O.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 965 - 970
  • [46] Information Security Evaluation using KAMI Index for Security Improvement in BMKG
    Sensuse, D. I.
    Syarif, M.
    Suprapto, H.
    Wirawan, R.
    Satria, D.
    Normandia, Y.
    2017 5TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT (CITSM 2017), 2017, : 391 - 394
  • [47] Multicriteria choice based on criteria importance methods with uncertain preference information
    A. P. Nelyubin
    V. V. Podinovski
    Computational Mathematics and Mathematical Physics, 2017, 57 : 1475 - 1483
  • [48] Multicriteria Choice Based on Criteria Importance Methods with Uncertain Preference Information
    Nelyubin, A. P.
    Podinovski, V. V.
    COMPUTATIONAL MATHEMATICS AND MATHEMATICAL PHYSICS, 2017, 57 (09) : 1475 - 1483
  • [49] Usability and security an appraisal of usability issues in information security methods
    Schultz, EE
    Proctor, RW
    Lien, MC
    Salvendy, G
    COMPUTERS & SECURITY, 2001, 20 (07) : 620 - 634