首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于层次分析法的信息系统漏洞量化评估方法
引用本文:李 鑫,李京春,郑雪峰,张友春,王少杰. 一种基于层次分析法的信息系统漏洞量化评估方法[J]. 计算机科学, 2012, 39(7): 58-63
作者姓名:李 鑫  李京春  郑雪峰  张友春  王少杰
作者单位:1. 北京科技大学计算机与通信工程学院 北京100083
2. 国家信息技术安全研究中心 北京100084
基金项目:国家863计划项目,国家发改委信息安全专项项目
摘    要:根据层次分析法提出了一种具有可操作性的信息系统漏洞量化评估方法。按照分层思想,将系统漏洞严重程度的模型分解为因素层、评价层、特性层和目标层,分别从风险概率、风险影响和不可控制性等几方面对漏洞带来的风险因素进行专家评定,并依此来确定权重,通过计算其各层评估值,最后得到信息系统的整体漏洞严重性评估值。实验结果表明,基于层次分析法的信息系统漏洞评估方法能对系统漏洞的严重性程度进行有效量化和评估。

关 键 词:层次分析法  信息系统  漏洞  评估方法

Analytic Hierarchy Process (AHP)-based Vulnerability Quantitative Assessment Method for Information Systems
LI Xin , LI Jing-chun , ZHENG Xue-feng , ZHANG You-chun , WANG Shao-jie. Analytic Hierarchy Process (AHP)-based Vulnerability Quantitative Assessment Method for Information Systems[J]. Computer Science, 2012, 39(7): 58-63
Authors:LI Xin    LI Jing-chun    ZHENG Xue-feng    ZHANG You-chun    WANG Shao-jie
Affiliation:2(School of Computer and Communication Engineering,University of Science and Technology Beijing,Bejing 100083,China)1(National Research Center for Information Technology Security,Bejing 100084,China)2
Abstract:This paper proposed a practical vulnerabilities quantitative assessment method for information system based on the Analytic Hierarchy Process (AHP). According to the hierarchical thought,the system vulnerability that reflects the severity serious degree model was decomposed into four factors, such as factors layer, evaluation factors layer, characteristic layer and target layer. Some vulnerability risk factors were evaluated respectively by expert to determine the weight from several aspects, such as the risk probability, risk influence and uncontrollable character. Through calculating the value of each layer,we got the overall value of information system vulnerability severity assessment finally. Theexperimental results show that the Analytic Hierarchy Process (AHP)-based vulnerability assessment method can quantify and assess the seriousness of system vulnerability effectively.
Keywords:Analytic hierarchy process  Information system   Vulnerability   Assessment method
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号