The model of information security risk assessment based on advanced evidence theory

被引:2
|
作者
Qing H. [1 ]
Qingsheng X. [1 ]
Shaobo L. [1 ]
机构
[1] Key Laboratory of Advanced Manufacturing Technology, Ministry of Education, Guizhou University, Guiyang, 50003, Guizhou
关键词
Combination rule; Evidence theory; Information security; Risk assessment;
D O I
10.1007/s13198-016-0424-4
中图分类号
学科分类号
摘要
With regard to nonlinearity and uncertainty in information security risk assessment, and on the foundation of hierarchical structure of information security risk assessment, the paper proposed a model of information security risk assessment based on advanced D–S evidence theory. In terms of the extent of danger of various risk factors in the system, and through the advanced Dempster combination rule, the paper obtained risk values of the system by combining the assignment of basic probability of various risk factors in the index system. The simulative results proved that the method herein was free from disadvantages of existing assessment methods that had great randomness and fuzzy conclusion, and was more convergent and self-adaptive. © 2016, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.
引用
收藏
页码:2030 / 2035
页数:5
相关论文
共 50 条
  • [41] The Information Security Risk Assessment Based on Fuzzy Comprehensive Evaluation
    Li Guohong
    Cai Yongkai
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS A-C, 2008, : 2027 - 2031
  • [42] Information security risk assessment based on G-ANP
    Zhao, G. (zhaogang@bistu.edu.cn), 1761, Tsinghua University (53):
  • [43] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
  • [44] Index Reduction for Information systems security risk assessment Based on Rough Set Theory and Hierarchic Analysis
    Fu, Yu
    Wu, Xiaoping
    Zhu, Tingting
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 370 - 374
  • [45] Information System Security Risk Assessment Based on IDAV Multi-Criteria Decision Model
    Yang, Jinning
    Han, Jiazhen
    Zhang, Xiuyan
    PROCEEDINGS OF 2018 12TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2018, : 121 - 127
  • [46] Information security risk assessment based on two stages decision model with grey synthetic measure
    School of Information Science and Engineering, Lanzhou University, Lanzhou, Gansu Province, China
    Proc.IEEE Int. Conf. Software Eng. Serv. Sci., ICSESS, (795-798):
  • [47] Information Security Risk Assessment Based on Two Stages Decision Model with Grey Synthetic Measure
    Luo, Hongsheng
    Shen, Yongjun
    Zhang, Guidong
    Huang, Liangliang
    PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 795 - 798
  • [48] Information security risk analysis model using fuzzy decision theory
    Henriques de Gusmao, Ana Paula
    Camara e Silva, Lucio
    Silva, Maisa Mendonca
    Poleto, Thiago
    Cabral Seixas Costa, Ana Paula
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (01) : 25 - 34
  • [49] A Network Security Risk Assessment Framework Based on Game Theory
    He, Wei
    Xia, Chunhe
    Zhang, Cheng
    Ji, Yi
    Ma, Xinyi
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 742 - 746
  • [50] Study on Risk Assessment of Network Security Based on Game Theory
    Xu Yanli
    Wang Lingling
    ADVANCED MATERIALS SCIENCE AND TECHNOLOGY, PTS 1-2, 2011, 181-182 : 799 - +