首页 | 本学科首页   官方微博 | 高级检索  
     

基于模糊集和DS证据理论的信息安全风险评估方法*
引用本文:王姣,范科峰,莫玮.基于模糊集和DS证据理论的信息安全风险评估方法*[J].计算机应用研究,2017,34(11).
作者姓名:王姣  范科峰  莫玮
作者单位:桂林电子科技大学 电子工程与自动化学院,中国电子技术标准化研究院,桂林电子科技大学 电子工程与自动化学院
基金项目:国家智能制造专项(京财经一指[2015]1170号);工信部工控安全评估专项(工信软函[2015]366号);国家科技支撑计划(2015BAK21B04);电子发展基金(工信部财[2014]425号)
摘    要:在信息安全风险评估过程中,存在着很多不确定和模糊的因素,针对专家评价意见的不确定性和主观性问题,提出了一种将模糊集理论与DS证据理论进行结合的的风险评估方法。首先,根据信息安全风险评估的流程和要素,建立风险评估指标体系,确定风险影响因素;其次,通过高斯隶属度函数,求出专家对各影响因素的评价意见隶属于各个不同评价等级的程度;再次,将其作为DS理论所需的基本概率分配,引入基于矩阵分析和权值分配的融合算法综合多位专家的评价意见;最后,结合贝叶斯网络模型的推理算法,得出被测信息系统所面临的风险大小,并对其进行分析。结果显示,将模糊集理论和DS证据理论应用到传统贝叶斯网络风险评估的方法,在一定程度上能够提高评估结果的客观性。

关 键 词:信息安全  风险评估  模糊集  DS证据理论  贝叶斯网络
收稿时间:2016/8/5 0:00:00
修稿时间:2017/8/2 0:00:00

A Method for Information Security Risk Assessment Based on the Fuzzy Set Theory and DS Evidence Theory
Wang Jiao,Fan Kefeng and Mo Wei.A Method for Information Security Risk Assessment Based on the Fuzzy Set Theory and DS Evidence Theory[J].Application Research of Computers,2017,34(11).
Authors:Wang Jiao  Fan Kefeng and Mo Wei
Affiliation:Guilin University of Electronic Technology,Guangxi Guilin,,Guilin University of Electronic Technology,Guangxi Guilin
Abstract:There are many uncertain and fuzzy factors in the information security risk assessment process. For the uncertainty and subjectivity of expert evaluation, we propose a risk assessment method on the basis of fuzzy set theory and DS Evidence Theory. Firstly, according to the processes and elements of the information security risk assessment, an index system is established and risk factors are confirmed. Secondly, calculate the degree of expert evaluation belonging to various levels through Gauss membership function. Thirdly, make the above results as basic probability assigment of DS theory and adopt a fusion arithmetic based on matrix analysis and weight distribution to synthesize views of some experts. Finally, combining with the Bayesian theory and inference procedure, we can calculate and analysis the probability of risk of the information system. The results show that the method which is based on the fuzzy set theory and DS evidence theory can improve the objectivity of the evaluation results.
Keywords:information security  risk assessment  fuzzy set theory  DS evidence theory  Bayesian network
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号