The model of information security risk assessment based on advanced evidence theory

被引:2
|
作者
Qing H. [1 ]
Qingsheng X. [1 ]
Shaobo L. [1 ]
机构
[1] Key Laboratory of Advanced Manufacturing Technology, Ministry of Education, Guizhou University, Guiyang, 50003, Guizhou
关键词
Combination rule; Evidence theory; Information security; Risk assessment;
D O I
10.1007/s13198-016-0424-4
中图分类号
学科分类号
摘要
With regard to nonlinearity and uncertainty in information security risk assessment, and on the foundation of hierarchical structure of information security risk assessment, the paper proposed a model of information security risk assessment based on advanced D–S evidence theory. In terms of the extent of danger of various risk factors in the system, and through the advanced Dempster combination rule, the paper obtained risk values of the system by combining the assignment of basic probability of various risk factors in the index system. The simulative results proved that the method herein was free from disadvantages of existing assessment methods that had great randomness and fuzzy conclusion, and was more convergent and self-adaptive. © 2016, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.
引用
收藏
页码:2030 / 2035
页数:5
相关论文
共 50 条
  • [31] pISRA: privacy considered information security risk assessment model
    Wei, Yu-Chih
    Wu, Wei-Chen
    Lai, Gu-Hsin
    Chu, Ya-Chi
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (03): : 1468 - 1481
  • [32] Classified Information System Security Risk Assessment Model of the Research
    Peng, Chong
    Shao, Liping
    2015 INTERNATIONAL CONFERENCE ON LOGISTICS, INFORMATICS AND SERVICE SCIENCES (LISS), 2015,
  • [33] pISRA: privacy considered information security risk assessment model
    Yu-Chih Wei
    Wei-Chen Wu
    Gu-Hsin Lai
    Ya-Chi Chu
    The Journal of Supercomputing, 2020, 76 : 1468 - 1481
  • [34] Construction of Information Security Risk Assessment Model in Smart City
    Hui, Pan
    2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 393 - 396
  • [35] Using fuzzy logic and entropy theory to risk assessment of the information security
    Zhao, DM
    Wang, JH
    Wu, J
    Ma, JF
    Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2448 - 2453
  • [36] An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
    Sun, LL
    Srivastava, RP
    Mock, TJ
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2006, 22 (04) : 109 - 142
  • [37] Information security risk analysis model based on entropy
    Tang, Y. L.
    Xu, G. A.
    Niu, Y. X.
    Yang, Y. X.
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1146 - 1150
  • [38] Risk Analysis of Information System Security Based on the Evidence Distance
    LingHu, Jinhua
    Pan, Ping
    Du, Yaoyao
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON MODELLING, IDENTIFICATION AND CONTROL (ICMIC2019), 2020, 582 : 347 - 358
  • [39] The Research of Information Security Risk Assessment Method Based on AHP
    Xu, Ning
    Zhao, DongMei
    SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 575 - 580
  • [40] Risk Assessment for Information Security Based on Fuzzy Membership Matrix
    Bai, Yan
    Yao, Zhong
    Li, Hong
    Zhang, Yong-Qiang
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 547 - +