Abstract

A method based on improved fuzzy theory of evidence was presented to solve the problem that there exist all kinds of uncertainty in the process of information security risk assessment. The hierarchy model for the information systems risk assessment was established firstly, and then fuzzy sets were introduced into theory of evidence. The basic probability assignments were constructed using the membership function of fuzzy sets, and the basic probability assignments were determined. Moreover, weight coefficients were calculated using entropy weight and empirical factor, which combined the objective weights with the subjective ones, and improved the validity and reliability. An illustration example indicates that the method is feasible and effective, and provides reasonable data for constituting the risk control strategy of the information systems security.

Highlights

  • With the rapid development of computer networks and their applications, the Internet has gradually become the inevitable part of people’s work and life

  • In the aspect of current study, researchers home and abroad have adopted fuzzy mathematics, neural networks, support vector machines (SVMs) and other methods [2,3,4,5] to establish security risk assessment models, and achieved many useful results. These results improved the theory of security risk assessment for information systems

  • The information security risk assessment problem was solved by using an evidence theory based method

Read more

Summary

Introduction

With the rapid development of computer networks and their applications, the Internet has gradually become the inevitable part of people’s work and life. Study on feasible security risk assessment methods for information systems has important theoretical and practical significance for exploiting the advantages of all kinds of information systems and ensuring the reliable and stable operation of modern society. In the aspect of current study, researchers home and abroad have adopted fuzzy mathematics, neural networks, support vector machines (SVMs) and other methods [2,3,4,5] to establish security risk assessment models, and achieved many useful results. These results improved the theory of security risk assessment for information systems. The objective weights derived by the decision matrix were combined with the subjective expert weights, improving the scientificalness and effectiveness of weight determination

Establishing index system of information security risk assessment
Basics of evidence theory
Fuzzy evidence theory
Case analysis
Conclusions
Authors
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.