The model of information security risk assessment based on advanced evidence theory

被引:2
|
作者
Qing H. [1 ]
Qingsheng X. [1 ]
Shaobo L. [1 ]
机构
[1] Key Laboratory of Advanced Manufacturing Technology, Ministry of Education, Guizhou University, Guiyang, 50003, Guizhou
关键词
Combination rule; Evidence theory; Information security; Risk assessment;
D O I
10.1007/s13198-016-0424-4
中图分类号
学科分类号
摘要
With regard to nonlinearity and uncertainty in information security risk assessment, and on the foundation of hierarchical structure of information security risk assessment, the paper proposed a model of information security risk assessment based on advanced D–S evidence theory. In terms of the extent of danger of various risk factors in the system, and through the advanced Dempster combination rule, the paper obtained risk values of the system by combining the assignment of basic probability of various risk factors in the index system. The simulative results proved that the method herein was free from disadvantages of existing assessment methods that had great randomness and fuzzy conclusion, and was more convergent and self-adaptive. © 2016, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.
引用
收藏
页码:2030 / 2035
页数:5
相关论文
共 50 条
  • [21] Compliance determination based CME information system security risk assessment model
    Zhang, Xueqin
    Jiang, Changqin
    Xu, Cuihua
    Lin, Jiajun
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2010, 50 (SUPPL. 1): : 1560 - 1565
  • [22] Assessment Model and Method Research of Information Security Risk
    Lu Zhen
    Xiong Zhen
    Tu Keqin
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2170 - +
  • [23] General risk assessment model for information system security
    Chi, Yue
    Zhang, Yong-Zheng
    Yun, Xiao-Chun
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (SUPPL. 1): : 192 - 194
  • [24] A Novel Security Risk Assessment Model for Information System
    Lv, Huiying
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 282 - 287
  • [25] Assessment of risk of information security by means of the theory of fuzzy sets
    Murathin, R.
    Satybaldina, D. Z.
    BULLETIN OF THE KARAGANDA UNIVERSITY-MATHEMATICS, 2015, 79 (03): : 66 - 74
  • [26] Risk Assessment of Power Information Risk Security Based on Risk Matrix
    Wang Xu
    Chen Tao
    Wang Yujie
    Guo Qinrui
    Teng Yangxin
    PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 1494 - 1498
  • [27] An Information Security Risk Assessment System Based on Knowledge
    Ma, Jianqiang
    2017 4TH ICMIBI INTERNATIONAL CONFERENCE ON TRAINING, EDUCATION, AND MANAGEMENT (ICMIBI-TEM 2017), 2017, 83 : 376 - 381
  • [28] Risk Assessment Method of Information Security Based on AHP
    Ning, Xu
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 430 - 433
  • [29] An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process
    Liu Dong-liang
    Yang Shi-song
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 874 - 877
  • [30] Campus Network Information Security Risk Assessment Based on FAHP and Matter Element Model
    Geng, Fangfang
    Ruan, Xiaolong
    INTELLIGENT COMPUTING METHODOLOGIES, ICIC 2017, PT III, 2017, 10363 : 298 - 306