期刊文献+

考虑成本与要素关系的信息安全风险分析模型 被引量:8

Information security risk analysis model considering costs and factors relevance
下载PDF
导出
摘要 针对信息安全风险评估问题,提出了同时考虑风险要素关系和控制措施作用及成本的风险分析模型.与现有研究成果相比,该风险分析模型的优势在于充分考虑威胁和脆弱性等风险要素相互关系的基础上,更加注重控制措施对威胁和脆弱性等风险要素的影响关系,同时考虑风险处理时控制措施的成本,为风险评估提供更加客观、准确的风险分析方法和有效的控制措施选择与优化策略.案例分析结果表明,利用该多目标决策风险分析模型能够有效地量化风险评估要素间的影响关系,依据控制措施的有效程度和合理成本提供客观、准确的控制措施优选排序,提高风险评估的准确性,从而为信息安全风险管理提供科学的决策依据. Aiming at the information security risk assessment,a risk analysis model considering relevance among risk factors and controls with costs was proposed. Compared with the present research results,the proposed method not only fully considers the interrelation between the threats and vulnerabilities,but also concentrates on the influence of controls on such risk factors as threats and vulnerabilities,and simultaneously pays attention to the costs of risk treatment controls,which provides more objective and accurate method for risk assessment and effective strategy for control selection and optimization. The results of case analysis showthat the proposed risk analysis model based on multi-objective decision making can effectively quantize the interrelations among the risk assessment factors,provide the objective and accurate priority orders for control optimization according to the efficiency and rational costs of the controls,improve the accuracy of risk assessment,and thus provide the scientific decision making evidence for the information security risk management.
出处 《沈阳工业大学学报》 EI CAS 北大核心 2015年第1期69-74,共6页 Journal of Shenyang University of Technology
基金 国家"十二五"科技支撑计划项目(2012BAH08B02) 国家自然科学基金资助项目(61272513) 北京市自然科学基金资助项目(4132011)
关键词 风险评估 风险要素相互关系 控制措施选择 成本 多目标决策 信息安全 决策试验和评价实验法 逼近理想求解的排序法 risk assessment interrelation of risk factor controls-selecting cost multi-objective decision making information security decision making test and evaluation test ordering method approximate to ideal solution
  • 相关文献

参考文献8

二级参考文献59

共引文献145

同被引文献78

  • 1徐明,陈纯,应晶.一个两层马尔可夫链异常入侵检测模型(英文)[J].软件学报,2005,16(2):276-285. 被引量:7
  • 2吴溥峰,张玉清.数据库安全综述[J].计算机工程,2006,32(12):85-88. 被引量:96
  • 3唐万梅.基于灰关联分析的多层次综合评价研究——风险投资项目综合评价模型[J].系统工程理论与实践,2006,26(6):25-29. 被引量:51
  • 4沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 5360互联网安全中心.2012年中国互联网安全报告[EB/OL].北京:360互联网安全中心,2013(2013-02-25)[2015-04-30].http://awuvsvkkjf.l5.yunpan.cn/lk/QUPZKyLbVTBTH.
  • 6Ding Y X,Yuan X B,Tang K,et al.A fast malware detection algorithm based on objective-oriented associa-tion mining[J].Computers &Security,2013,39:315-324.
  • 7Silvio C,Yang X,Zhou W L.Control flow-based malware variant detection[J].IEEE Transactions on Dependable and Secure Computing,2014,11(4):304-317.
  • 8Kolter J Z,Marcus A.Learning to detect malicious executables in the wild[C]//Knowledge Discovery and Data Mining.New York,USA,2004:470-478.
  • 9Nissim N,Robert M,Lior R,et al.Novel active learning methods for enhanced PC malware detection in windows OS[J].Expert Systems with Applications,2014,41(13):5843-5857.
  • 10Bai J R,Wang J F,Zou G Z.A malware detection scheme based on mining format information[J].The Scientific World Journal,2014,15(2):1-11.

引证文献8

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部