A Method of Information Security Risk Assessment Using Fuzzy Number Operations

被引:0
|
作者
Fu, Yu [1 ]
Qin, Yanlin [1 ]
Wu, Xiaoping [1 ]
机构
[1] Naval Univ Engn, Dept Informat Secur, Wuhan, Peoples R China
关键词
Information security; Risk assessment; Triangular fuzzy number;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
After systematic analysis of risk factors of information security and assessment process, a quantitative security assessment method is presented based on fuzzy number operations. Both the fuzziness of the indices and the uncertainty of weight determination are considered. Then the grades of fuzzy language variables are given, and the opinions of multi experts are integrated to triangular fuzzy numbers. Hence, comprehensive fuzzy assessment is made by using the operation rules defined on the triangular fuzzy number. Finally, by using fuzzy number ranking method, the assessment result is defuzzified and the risk grade is determined. An illustrative example is given to show the effectiveness and validity of this method.
引用
收藏
页码:12564 / 12567
页数:4
相关论文
共 50 条
  • [1] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    [J]. MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
  • [2] Security Risk Assessment Method Using Fuzzy Logic
    Ismagilov, Ilyas I.
    Molotov, Linar A.
    Gilmullin, Timur M.
    Anikin, Igor, V
    Katasev, Alexey S.
    [J]. HELIX, 2018, 8 (06): : 4674 - 4682
  • [3] Information security risk assessment using the AHP method
    Zaburko, J.
    Szulzyk-Cieplak, J.
    [J]. IV INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN ENGINEERING SCIENCE (CMES'19), 2019, 710
  • [4] Risk assessment of information security using fuzzy wavelet neural network
    School of Information Technology, Hebei Normal University, Shijiazhuang 050016, China
    不详
    不详
    [J]. Huazhong Ligong Daxue Xuebao, 2009, 11 (43-45+49):
  • [5] Using fuzzy logic and entropy theory to risk assessment of the information security
    Zhao, DM
    Wang, JH
    Wu, J
    Ma, JF
    [J]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2448 - 2453
  • [6] Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set
    Cai, Wentian
    Yao, Huijun
    [J]. Wireless Communications and Mobile Computing, 2021, 2021
  • [7] Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set
    Cai, Wentian
    Yao, Huijun
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [8] Method of Information Security Risk Assessment Based on Improved Fuzzy Theory of Evidence
    Huang Xuepeng
    Xu Wei
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (03) : 188 - 196
  • [9] Fuzzy risk assessment of information security threat scenario
    Ge, Hai-Hui
    Zheng, Shi-Hui
    Chen, Tian-Ping
    Yang, Yi-Xian
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2013, 36 (06): : 89 - 92
  • [10] Information Security Risk Assessment: A Method Comparison
    Wangen, Gaute
    [J]. COMPUTER, 2017, 50 (04) : 52 - 61