全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

信息安全威胁场景模糊风险评估方法

DOI: 10.13190/j.jbupt.2013.06.019

Keywords: 信息安全,威胁场景,风险评估,层次分析法,隶属度矩阵

Full-Text   Cite this paper   Add to My Lib

Abstract:

提出了一种针对威胁场景的风险评估方法.首先构建了威胁场景的递阶层次化风险评价指标体系结构,定义了描述安全措施与风险形成关系的"不可控性"指标,增强了指标体系的完备性;其次定义了指标的高斯型隶属函数,在此基础上提出一种基于隶属度矩阵构造法的模糊综合评判模型,降低了评估过程中人为主观因素的影响;最后将上述模糊综合评判模型与层次分析法相结合对TS的风险度进行了量化计算.通过实例分析表明该方法是科学的、有效的,为实现风险度大小排序提供了重要依据.

References

[1]  Ge Haihui, Gu Lize, Yang Yixian, et al. An attack graph based network security evaluation model for hierarchical network[C]//Yixian Yang. Proceedings 2010 IEEE International Conference on Information Theory and Information Security. Beijing: IEEE Press, 2010: 208-211.
[2]  Li Kai, Gu Naijie, Bi Kun, et al. Network security evaluation algorithm based on access level vector[C]//The 9th International Conerence for Young Computer Scientists. Hunan:[s.n.], 2008: 1538-1544.
[3]  张利, 姚轶崭, 彭建芬, 等. 基于决策树的智能信息安全风险评估方法[J]. 清华大学学报: 自然科学版, 2011, 51(10): 1236-1239. Zhang Li, Yao Yizhan, Peng Jianfen, et al. Intelligent information security risk assessment based on a decision tree algorithm[J]. Journal of Tsing hua University: Science and Technology, 2011, 51(10): 1236-1239.
[4]  Niu Honghui, Shang Yanling. Research on risk assessment model of information security based on Particle swarm algorithm-RBF neural network[C]//Circuits, Communications and System(PACCS). Beijing:[s.n.], 2010: 479-482.
[5]  Qu Zhiming. Application of comprehensive fuzzy evaluation in enterprise network security[C]//Power Electronics and Intelligent Transportation System(PEITS). Shenzhen:[s.n.], 2009: 54-57.
[6]  吕镇邦, 周波. 基于Shapley熵和Choquet积分的层次化风险评估[J]. 北京邮电大学学报, 2009, 32(6): 83-87. Lü Zhenbang, Zhou Bo. Hierarchical risk assessment based on shapley entropies and choquet integrals[J]. Journal of Beijing University of Posts and Telecommunications, 2009, 32(6): 83-87.
[7]  赵冬梅, 马建峰, 王跃生. 信息系统的模糊风险评估模型[J]. 通信学报, 2007, 28(4): 51-64. Zhao Dongmei, Ma Jianfeng, Wang Yuesheng. Model of fuzzy risk assessment of the information system[J]. Journal on Communications, 2007, 28(4): 51-64.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133