A Method For Information Security Risk Aassessment Based On Fuzzy Operator

被引:0
|
作者
Ye, ShiChao [1 ]
Wu, KeHe [2 ]
Niu, YuGuang
机构
[1] North China Elect Power Univ, Dept Control, Beijing 102206, Peoples R China
[2] North China Elect Power Univ, Beijing Engn Res Ctr Elect Informat Technol, Beijing 102206, Peoples R China
关键词
information security; risk assessment; fuzzy operator; OWA OPERATOR; WEIGHTS;
D O I
10.4028/www.scientific.net/AMR.850-851.454
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
To address the security risks of information systems to make accurate quantitative assessment of problems in the OWA operator and based on gray theory DHGF algorithm is proposed based on combining advantages of both information security risk assessment methodology. Information security risk assessment based on an a priori sample value index depth of excavation, the use of the basic methods of OWA operator, objective indicators derived property rights, and the use of gray theory for assessing the value of integration. This approach will be applied to information security risk assessment, to ensure the objectivity of the evaluation results, while reducing dependence on the assessed value of integrity, to solve the traditional information security risk assessment methodology for index data have special requirements, it is difficult strictly objective and quantitative problems. Assessment examples show the effectiveness of the method and objectivity.
引用
收藏
页码:454 / +
页数:2
相关论文
共 50 条
  • [1] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    [J]. MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
  • [2] Method of Information Security Risk Assessment Based on Improved Fuzzy Theory of Evidence
    Huang Xuepeng
    Xu Wei
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (03) : 188 - 196
  • [3] Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set
    Cai, Wentian
    Yao, Huijun
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [4] The Information Security Risk Assessment Based on Fuzzy Comprehensive Evaluation
    Li Guohong
    Cai Yongkai
    [J]. PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS A-C, 2008, : 2027 - 2031
  • [5] Risk Assessment for Information Security Based on Fuzzy Membership Matrix
    Bai, Yan
    Yao, Zhong
    Li, Hong
    Zhang, Yong-Qiang
    [J]. NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 547 - +
  • [6] A Method of Information Security Risk Assessment Using Fuzzy Number Operations
    Fu, Yu
    Qin, Yanlin
    Wu, Xiaoping
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12564 - 12567
  • [7] Risk Assessment Method of Information Security Based on AHP
    Ning, Xu
    [J]. PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 430 - 433
  • [8] The Comprehensive Evaluation Method for Organizing Information Security Risk based on Fuzzy Multi-criteria Fusion
    Liang, Liang
    Wang, Peng
    Tan, Lin
    [J]. DISASTER ADVANCES, 2013, 6 : 370 - 380
  • [9] A fuzzy DRBFNN-based information security risk assessment method in improving the efficiency of urban development
    Yang, Li
    Zou, Kai
    Gao, Kai
    Jiang, Zhiyi
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2023, 19 (12) : 14232 - 14250
  • [10] Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees
    Shang, Wenli
    Gong, Tianyu
    Chen, Chunyu
    Hou, Jing
    Zeng, Peng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019,