The model of information security risk assessment based on advanced evidence theory

被引:2
|
作者
Qing H. [1 ]
Qingsheng X. [1 ]
Shaobo L. [1 ]
机构
[1] Key Laboratory of Advanced Manufacturing Technology, Ministry of Education, Guizhou University, Guiyang, 50003, Guizhou
关键词
Combination rule; Evidence theory; Information security; Risk assessment;
D O I
10.1007/s13198-016-0424-4
中图分类号
学科分类号
摘要
With regard to nonlinearity and uncertainty in information security risk assessment, and on the foundation of hierarchical structure of information security risk assessment, the paper proposed a model of information security risk assessment based on advanced D–S evidence theory. In terms of the extent of danger of various risk factors in the system, and through the advanced Dempster combination rule, the paper obtained risk values of the system by combining the assignment of basic probability of various risk factors in the index system. The simulative results proved that the method herein was free from disadvantages of existing assessment methods that had great randomness and fuzzy conclusion, and was more convergent and self-adaptive. © 2016, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.
引用
收藏
页码:2030 / 2035
页数:5
相关论文
共 50 条
  • [1] Method of Information Security Risk Assessment Based on Improved Fuzzy Theory of Evidence
    Huang Xuepeng
    Xu Wei
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (03) : 188 - 196
  • [2] WAMS Information Security Assessment Based on Evidence Theory
    Liu Wen-xia
    Fan Yong-feng
    Zhang Li-xin
    Zhang Xin
    Que Hua-kun
    2009 INTERNATIONAL CONFERENCE ON SUSTAINABLE POWER GENERATION AND SUPPLY, VOLS 1-4, 2009, : 268 - +
  • [3] Information System Security Risk Assessment Based on Multidimensional Cloud Model and The Entropy Theory
    Huang, Liangliang
    Shen, Yongjun
    Zhang, Guidong
    Luo, Huixia
    PROCEEDINGS OF 2015 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION, 2015, : 11 - 15
  • [4] Information Security Risk Assessment Based on D-S Evidence Theory and Improved TOPSIS
    Wu, Xiaoqian
    Shen, Yongjun
    Zhang, Guidong
    Zhi, Hua
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 153 - 156
  • [5] Security Risk Assessment Model Based on AHP/D-S Evidence Theory
    Lu Simei
    Zhang Jianlin
    Sun Hao
    Luo Liming
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 530 - 534
  • [6] Theory and methods of information security risk assessment
    Min, Jinghua
    Zhang, Jianjun
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2010, 50 (SUPPL. 1): : 1554 - 1559
  • [7] The Information Security Risk Assessment Model Based on GA - BP
    Song, Yongqiang
    Shen, Yongjun
    Zhang, Guidong
    Hu, Yuming
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 119 - 122
  • [8] Information Security Risk Assessment Based on Artificial Immune Danger Theory
    Zhuang, Yi
    Li, Xiaorong
    Xu, Bin
    Zhou, Bo
    2009 FOURTH INTERNATIONAL MULTI-CONFERENCE ON COMPUTING IN THE GLOBAL INFORMATION TECHNOLOGY (ICCGI 2009), 2009, : 169 - 174
  • [9] Danger Theory Based Model for Network Security Risk Assessment
    Sun, Feixian
    SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 148 - 154
  • [10] Network security risk assessment model based on fuzzy theory
    Yi, Bo
    Cao, Yuan Ping
    Song, Ying
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (04) : 3921 - 3928