A new information security risk analysis method based on membership degree
Author:
Chen Jiqiang,Pedrycz Witold,Ma Litao,Wang Chao
Abstract
Purpose
– In a risk analysis system, different underlying indices often play different roles in identifying the risk scale of the total target in a system, so a concept of discriminatory weight is introduced first. With the help of discriminatory weight and membership functions, a new method for information security risk analysis is proposed. The purpose of this paper is to discuss the above issues.
Design/methodology/approach
– First, a concept of discriminatory weight is introduced. Second, with the help of fuzzy sets, risk scales are captured in terms of fuzzy sets (namely their membership functions). Third, a new risk analysis method involving discriminatory weights is proposed to realize a transformation from the membership degrees of the underlying indices to the membership degrees of the total target. At last, an example of information security risk analysis shows the effectiveness and feasibleness of the new method.
Findings
– The new method generalizes the weighted-average method. The comparative analysis done with respect to other two methods show that the proposed method exhibits higher classification accuracy. Therefore, the proposed method can be applied to other risk analysis system with a hierarchial.
Originality/value
– This paper proposes a new method for information security risk analysis with the help of membership functions and the concept of discriminatory weight. The new method generalizes the weighted-average method. Comparative analysis done with respect to other two methods show that the proposed method exhibits higher classification accuracy in E-government information security system. What is more, the proposed method can be applied to other risk analysis system with a hierarchial.
Subject
Computer Science (miscellaneous),Social Sciences (miscellaneous),Theoretical Computer Science,Control and Systems Engineering,Engineering (miscellaneous)
Reference25 articles.
1. Armando, A.
and
Compagna, L.
(2008), “SAT-based model-checking for security protocols analysis”, International Journal of Information Security, Vol. 7 No. 1, pp. 3-32. 2. Ates, M.
,
Buccafurri, F.
,
Fayolle, J.
and
Lax, G.
(2012), “A warning on how to implement anonymous credential protocols into the information card framework”, International Journal of Information Security, Vol. 11 No. 1, pp. 33-40. 3. Bai, Y.
,
Yao, Z.
,
Li, H.
and
Zhang, Y.Q.
(2012), “Risk assessment for information security based on fuzzy membership matrix”, Network Computing and Information Security, Vol. 345, pp. 547-554. 4. Bolle, S.R.
,
Hasvold, P.
and
Henriksen, E.
(2011), “Video calls from lay bystanders to dispatch centers – risk assessment of information security”, BMC Health Services Research, Vol. 11, p. -, available at: www.biomedcentral.com/1472-6963/11/244 5. Chen, B.
,
Liu, X.P.
and
Tong, S.C.
(2007), “New delay-dependent stabilization conditions of T-S fuzzy systems with constant delay”, Fuzzy Sets and Systems, Vol. 158 No. 20, pp. 2209-2224.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|