An Evaluation Method for Information Security Level Based on OWA Operator and Bayesian Network

Article Preview

Abstract:

Analysis of information security threats in the system elements and assessment process, the decision-maker's subjective judgment threat level information and to obtain an objective evaluation by testing different forms of information and data, it is difficult for a direct threat assessment, proposed based on Bayesian network and OWA operator information security threat assessment model. First, combined with expert knowledge Bayesian network inference rules introduced conditional probability matrix, in order to build an information security threat assessment model. Secondly, based on OWA operator build the expert group decision making information system threat level of the target's subjective judgment information, and as a Bayesian network model of the target information system threat level of a priori information, and objective evaluation of information as a shell Julius observation node network model, which integrates the subjective and objective information security threat level. Finally, a simulation example shows that the model is reasonable and effective.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

72-75

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yager Ronald R, Families of OWA operators, Fuzzy sets and systems. 59. 2 (1993) 125-148.

DOI: 10.1016/0165-0114(93)90194-m

Google Scholar

[2] Yager Ronald R, Dimitar P. Filev, Induced ordered weighted averaging operators, Systems, Man, and Cybernetics, Part B, Cybernetics, IEEE Transactions. 29. 2 (1999) 141-150.

DOI: 10.1109/3477.752789

Google Scholar

[3] Yager, Ronald R, On ordered weighted averaging aggregation operators in multicriteria decisionmaking, Systems, Man and Cybernetics, IEEE Transactions. 18. 1 (1988) 183-190.

DOI: 10.1109/21.87068

Google Scholar

[4] Li, Xiangyang, and Qiang Ji, Active affective state detection and user assistance with dynamic Bayesian networks, Systems, Man and Cybernetics, Part A, Systems and Humans, IEEE Transactions. 35. 1 (2005) 93-105.

DOI: 10.1109/tsmca.2004.838454

Google Scholar

[5] Maglogiannis, Ilias, et al, Risk analysis of a patient monitoring system using Bayesian Network modeling, Journal of Biomedical Informatics. 39. 6 (2006) 637-647.

DOI: 10.1016/j.jbi.2005.10.003

Google Scholar

[6] Fu, Yu, Xiaoping Wu, Chenghua Yan, The method of information security risk assessment using Bayesian networks, Journal-Wuhan University Natural Sciences Edition. 52. 5 (2006) 631.

Google Scholar