Research on Information Security Risk Assessment Based on Discrete Dynamic Bayesian Network

Article Preview

Abstract:

Being important in the field of information security, it is essential to study the major process and the mathematical models of information security risk assessment.This paper proposed amodel based on the discrete dynamic Bayesian network and further studied the major process of the assessment.The experiment which works on the implementing platform shows the results are reasonable and feasible. The model proves that it iseffective to calculate the probability of the risk.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

295-299

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] D.E. Neumann. An Enhanced Neural Network Technique for Software Risk Analysis, IEEE TRANSACTIONS ON Software Engineering, September 2010, 28(9): 904-912.

DOI: 10.1109/tse.2002.1033229

Google Scholar

[2] J. Feng, N. Jiang, F. Liu. Multicast Routing Algorithm with Multi-QoS Based on Fuzzy Set Theory, Intelligent System Design and Engineering Application, 2012, 364-367.

DOI: 10.1109/isdea.2012.447

Google Scholar

[3] M. Beer. A Summary on Fuzzy Probability Theory, IEEE International Conference on Digital Object Identifier, 2010, 5-6.

Google Scholar

[4] Y. Wang, W.T. Wang, L. Zhang. Research on evaluation method of power quality for wind plant based on Probability Theory and Evidence Theory, Transportation, Mechanical, and Electrical Engineering, 2011, 1003-1006.

DOI: 10.1109/tmee.2011.6199373

Google Scholar

[5] S.M. Yacoub, H. Hammer, T. Robinson. A Methodology for Architectural-Level Risk Assessment using Dynamic Metrics, 11th International Symposium on Software Reliability Engineering, October 08-11, 2010, 210-221.

DOI: 10.1109/issre.2000.885873

Google Scholar

[6] L.W. Zhang, H.P. Guo. Bayesian Introduction , Beijing: Science Press, (2006).

Google Scholar

[7] N. Ocelot, G. Thomas. Threat assessment using Bayesian networks, Proceedings of the Sixth International Conference on Information Fusion, 2003, 733-740.

Google Scholar

[8] C. Sutton, C. Morrison. A Bayesian Blackboard for Information Fusion, Seventh International Conference on Information Fusion, 2004, 1(2): 1111-1116.

Google Scholar