Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor networ...Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor network system may fail and the evaluation of the severity of the damage caused by the failure. In this paper, we devise a methodology of Rough Outlier Detection (ROD) for the detection of security-based risk factor, which originates from violations of attack requirements (namely, attack risks). The methodology elaborates dimension reduction method to analyze the attack risk probability from high dimensional and nonlinear data set, and combines it with rough redundancy reduction and the distance measurement of kernel function which is obtained using the ROD. In this way, it is possible to determine the risky scenarios, and the analysis feedback can be used to improve the sensor network system design. We illustrate the methodology in the DARPA case set study using step-by-step approach and then prove that the method is effective in lowering the rate of false alarm.展开更多
Due to rapidly development of information systems, risk and security issues have increased and became a phenomenon that concerns every organization, without considering the size of it. To achieve desired results, mana...Due to rapidly development of information systems, risk and security issues have increased and became a phenomenon that concerns every organization, without considering the size of it. To achieve desired results, managers have to implement methods of evaluating and mitigating risk as part of a process well elaborated. Security risk management helps managers to better control the business practices and improve the business process. An effective risk management process is based on a successful IT security program. This doesn't mean that the main goal of an organization's risk management process is to protect its IT assets, but to protect the organization and its ability to perform their missions. During this process, managers have to take into consideration risks that can affect the organization and apply the most suitable measures to minimize their impact. The most important task is choosing the best suited method for analyzing the existing risk properly. Several methods have been developed, being classified in quantitative and qualitative approaches of evaluating risk. The purpose of this paper is to present the advantages and disadvantages of each approach taking current needs and opportunities into consideration.展开更多
基金the Jiangsu 973 Scientific Project,the National Natural Science Foundation of China,the Jiangsu Natural Science Foundation,the Aerospace Innovation Fund,the Lianyungang Science & Technology Project
文摘Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor network system may fail and the evaluation of the severity of the damage caused by the failure. In this paper, we devise a methodology of Rough Outlier Detection (ROD) for the detection of security-based risk factor, which originates from violations of attack requirements (namely, attack risks). The methodology elaborates dimension reduction method to analyze the attack risk probability from high dimensional and nonlinear data set, and combines it with rough redundancy reduction and the distance measurement of kernel function which is obtained using the ROD. In this way, it is possible to determine the risky scenarios, and the analysis feedback can be used to improve the sensor network system design. We illustrate the methodology in the DARPA case set study using step-by-step approach and then prove that the method is effective in lowering the rate of false alarm.
文摘Due to rapidly development of information systems, risk and security issues have increased and became a phenomenon that concerns every organization, without considering the size of it. To achieve desired results, managers have to implement methods of evaluating and mitigating risk as part of a process well elaborated. Security risk management helps managers to better control the business practices and improve the business process. An effective risk management process is based on a successful IT security program. This doesn't mean that the main goal of an organization's risk management process is to protect its IT assets, but to protect the organization and its ability to perform their missions. During this process, managers have to take into consideration risks that can affect the organization and apply the most suitable measures to minimize their impact. The most important task is choosing the best suited method for analyzing the existing risk properly. Several methods have been developed, being classified in quantitative and qualitative approaches of evaluating risk. The purpose of this paper is to present the advantages and disadvantages of each approach taking current needs and opportunities into consideration.