期刊文献+

基于模糊集与熵权理论的信息系统安全风险评估研究 被引量:82

An Approach for Information Systems Security Risk Assessment on Fuzzy Set and Entropy-Weight
下载PDF
导出
摘要 借助模糊集合理论,对信息系统所涉及的风险因素分别从资产影响、威胁频度、脆弱性严重程度三方面进行分析,并给出其等级描述;构造了各因素所对应评判集的隶属度矩阵,采用熵权系数法确定因素权重以减少传统权重确定方法的主观偏差;运用系统综合法集成三要素的安全风险值,进而判定信息系统安全风险等级.实例分析表明,该方法可行有效. The risk factors of information systems are classified into three aspects of influence on asset,frequency of threat and severity extent of survivabulity,which are analysed based on the fuzzy set theory to describe their fuzzy-valued grades.And their membership matrices for judgement set are presented.Then the weights of the risk factors are calculated with the entropy theory to reduce the subjectivity.The approach of comprehensive eveluation is applied into integrating the respective risk assessment results of such three factors to obtain the final risk grade.Finally,an illustrative example is shown that this proposed method is effective and reliability.
出处 《电子学报》 EI CAS CSCD 北大核心 2010年第7期1489-1494,共6页 Acta Electronica Sinica
基金 国家自然科学基金(No.60774029)
关键词 信息系统 安全风险评估 模糊 熵权 information systems security risk assessment fuzzy entropy-weight
  • 相关文献

参考文献17

  • 1ISO/IEC 154008[S].Common criteria for information technology security evaluation.Version 3.1,2006.http://www.commoncriteriaportal.org/.
  • 2ITSEC.Information technology security evaluation criteria,version 1.2[S].Office for official publications of the European communities,June 1991.
  • 3Jonsson E.A quantitative model of the security intrusion process based on attacker behavior[J].IEEE Trsactions on Software Engineering,1997,23(4).
  • 4Williams T M.The Two-Dimensionality of Project risk[J].International Joumal of Project Management,1996,14(3):185 -186.
  • 5Don-Lin Mon,Ching-Hsue Cheng,Jiann-Cjem Lin.Evaluating weapon system using fuzzy analytic hierarchy process based on entropy weight[J].Fuzzy Sets and Systems.1994,(62):127 -134.
  • 6Liou T-s,Wang M-J.Ranking fuzzy numbers with integral value[J].Fuzzy Sets and Systems,1992,50(2):247-255.
  • 7Kryszkiexicz M.Rough set approach to incomplete information system[J].Information Science,1998,112:39-49.
  • 8PawlakZ.Rough sets and intelligent data analysis[J].Information Sciences,2002,147:1-12.
  • 9Rouse W B,Cannon-Browers J A,Salas E.The role of mental models inteam performance incomplex systems[J].IEEE Transon Systems Man & Cybemetics,1992,22(6):1296-1308.
  • 10Johnson E M,Dowla F U,Goodman D M.Back propagating leaming for multilayer feed forwards neural networks using the conjugate gradient menthod[J].Int J Neural System,1991,2(4):291-302.

二级参考文献47

共引文献403

同被引文献605

引证文献82

二级引证文献543

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部