Netinfo Security ›› 2015, Vol. 15 ›› Issue (5): 62-68.doi: 10.3969/j.issn.1671-1122.2015.05.010

• Orginal Article • Previous Articles     Next Articles

Research on Information Security Risk Assessment Method Based on Similarity of Interval-valued Intuitionistic Fuzzy Sets

Xi-long TENG, Hai-peng QU()   

  1. College of Information Science and Engineering, Ocean University of China, Qingdao Shandong 266100, China
  • Received:2015-04-01 Online:2015-05-10 Published:2018-07-16

Abstract:

Risk assessment plays an important role in classified protection of information system. Through the risk assessment, threats and vulnerabilities can be clearly, level of risk and expected loss can be evaluated. System administrators can consolidate the problems which are found during the assessment to improve the security of the system. However the assessment result is greatly influenced by evaluator’s subjective factors in risk assessment progress. When assigning the safety of assets, it is difficult to give a precise number to describe the safety of assets. And evaluators give the safety assignments number based on their experience, knowledge and other factors, this number has certain subjectivity, but it can’t completely describe the evaluator’s subjective state of mind, so it influences the objective of assessment result. A risk assessment method is researched; it has some advantages in describing the evaluator’s subjective factors and reducing the influence caused by subjective factors in order to improve the objective of assessment result. The evaluator’s subjective states, such as certain, deny and hesitate, are described by interval-valued intuitionistic fuzzy sets. An interval-valued intuitionistic fuzzy similarity algorithm is proposed, and considering the national standard information security technology — baseline for classified protection of information system, the risk assessment method is proposed based above knowledge. The experimental result proves the effectively of this method, and it has a certain application value.

Key words: information security, risk assessment, information system, fuzzy system theory, interval-valued intuitionistic fuzzy sets

CLC Number: