A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty
Abstract
:1. Introduction
2. Preliminaries
2.1. Dempster–Shafer Evidence Theory
2.2. Weighted Average Combination Method of Combining Mass Functions
2.3. Uncertainty Measure in D-S Evidence Theory
2.4. Pignistic Probability Transformation
3. Approach of Network Security Risk Assessment
3.1. The Network Security Risk Assessment Approach Proposed by Gao et al.
3.1.1. Establish the Index System of the Network Risk
3.1.2. Use D-S Evidence Theory to Fuse Mass Functions
3.1.3. Obtain the Network Security Risk Value
3.1.4. Discussion of the Work Done by Gao et al.
3.2. The Novel Network Security Risk Assessment Approach Proposed in This Paper
3.2.1. Establish a Hierarchical Structure Model
3.2.2. Make an Evaluation Expressed by BPA
3.2.3. Determine the Subjective and Objective Weights
3.2.4. Obtain Comprehensive Weights
3.2.5. Use Weighted Average Combination Rule to Combine Mass Functions
3.2.6. Obtain the Risk Level of Computer Networks
4. Case Studies
4.1. An Example of Network Security Risk Assessment
4.1.1. Establish the Hierarchical Structure of Computer Networks
4.1.2. Make an Evaluation Expressed by BPA
4.1.3. Determine the Subjective and Objective Weights
4.1.4. Obtain Comprehensive Weights
4.1.5. Use Weighted Average Combination Rule to Combine the Mass Functions
4.1.6. Obtain the Risk Level of Computer Networks
4.1.7. The Analysis of the Sensitivity of the Proposed Method
4.2. Another Example of Network Security System Assessment
4.2.1. Use the Assessment Approach Proposed in This Paper to Assess Network Security Systems
- According to the weights of three decision-makers, the evaluation data based on linguistic information are transformed into the probability distribution of linguistic variables.
- By applying the uncertainty measure , the uncertainty of the probability distribution obtained in the previous step can be derived. Then, the uncertainty is used to discount the probability distribution to generate BPAs for evaluation.
4.2.2. The Assessment of Network Security Systems by Using the Approach Proposed by Gao et al.
4.2.3. The Ranking of Network Security Systems When Weights of Attributes Change
- The score of fluctuates at eight points and always ranks first, indicating that is excellent in both and .
- When the weights of and are changed, the score of decreases obviously. When , ranks third, with a very low score, indicating that is worse in and that more attention should be paid to .
- Similarly, the score of also decreases with the change of the weights of and , which indicates that there is a larger gap between and under than that under .
- The score of becomes higher and higher, indicating that more efforts should be made in to improve the overall situation of the network security system.
5. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
References
- Monostori, L.; Kádár, B.; Bauernhansl, T.; Kondoh, S.; Kumara, S.; Reinhart, G.; Sauer, O.; Schuh, G.; Sihn, W.; Ueda, K. Cyber-physical systems in manufacturing. CIRP Ann. Manuf. Technol. 2016, 65, 621–641. [Google Scholar] [CrossRef]
- Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber–physical system security for the electric power grid. Proc. IEEE 2012, 100, 210–224. [Google Scholar]
- Shei, S.; Kalloniatis, C.; Mouratidis, H.; Delaney, A. Modelling secure cloud computing systems from a security requirements perspective. In Proceedings of the International Conference on Trust & Privacy in Digital Business, Porto, Portugal, 07–08 September 2016; pp. 48–62. [Google Scholar]
- Patel, S.C.; Bhatt, G.D.; Graham, J.H. Improving the cyber security of SCADA communication networks. Commun. ACM 2009, 52, 139–142. [Google Scholar] [CrossRef]
- Mavropoulos, O.; Mouratidis, H.; Fish, A.; Panaousis, E.; Kalloniatis, C. A conceptual model to support security analysis in the internet of things. Comput. Sci. Inf. Syst. 2017, 14, 557–578. [Google Scholar] [CrossRef]
- Scott-Hayward, S.; Natarajan, S.; Sezer, S. A survey of security in software defined networks. IEEE Commun. Surv. Tutor. 2016, 18, 623–654. [Google Scholar] [CrossRef]
- Butun, I.; Morgera, S.D.; Sankar, R. A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 2014, 16, 266–282. [Google Scholar] [CrossRef]
- Langer, L.; Skopik, F.; Smith, P.; Kammerstetter, M. From old to new: Assessing cybersecurity risks for an evolving smart grid. Comput. Secur. 2016, 62, 165–176. [Google Scholar] [CrossRef]
- Zhang, Y.; Xiao, Y.; Ghaboosi, K.; Zhang, J.; Deng, H. A survey of cyber crimes. Secur. Commun. Netw. 2012, 5, 422–437. [Google Scholar] [CrossRef]
- Sharma, P.; Doshi, D.; Prajapati, M.M. Cybercrime: Internal security threat. In Proceedings of the IEEE International Conference on ICT in Business Industry & Government (ICTBIG), Indore, India, 18–19 November 2016; pp. 1–4. [Google Scholar]
- Yang, P. Study on cyber crime investigation and forensics based on internet traceability of computer firewall protocol. In Frontiers of Manufacturing Science & Measuring Technology V; C Book News: Portland, OR, USA, 2015; pp. 511–516. [Google Scholar]
- Gu, W.; Xu, L.; Ren, M.; Han, X. Network forensics scenario reconstruction method based on hidden Markov models. In Proceedings of the 2015 IEEE 7th International Conference on Information Technology in Medicine & Education (ITME), Huangshan, China, 13–15 November 2015; pp. 500–505. [Google Scholar]
- Li, Y.; Yan, J. Elf-based computer virus prevention technologies. In Information Computing & Applications, Pt II; National Natural Science Foundation of China (NSFC): Beijing, China, 2011; pp. 621–628. [Google Scholar]
- Zeng, L.; Xiao, Y.; Chen, H.; Sun, B.; Han, W. Computer operating system logging and security issues: A survey. Secur. Commun. Netw. 2016, 9, 4804–4821. [Google Scholar] [CrossRef]
- Kamarudin, M.H.; Maple, C.; Watson, T.; Safa, N.S. A logitboost-based algorithm for detecting known and unknown web attacks. IEEE Access 2017, 5, 26190–26200. [Google Scholar] [CrossRef]
- Liang, X.; Xiao, Y. Game theory for network security. IEEE Commun. Surv. Tutor. 2013, 15, 472–486. [Google Scholar] [CrossRef]
- Zheng, Z.; Sun, P. Application of RBF neural network in network security risk assessment. In Proceedings of the 2011 International Conference On Computational Science & Applications, Antwerp, Belgium, 26–27 March 2011; pp. 43–46. [Google Scholar]
- Kotenko, I.; Doynikova, E. Security assessment of computer networks based on attack graphs and security events. In Proceedings of the Information & Communication Technology-EurAsia Conference, Bali, Indonesia, 14–17 April 2014; pp. 462–471. [Google Scholar]
- Liang, L.; Yang, J.; Liu, G.; Zhu, G.; Yang, Y. Novel method of assessing network security risks based on vulnerability correlation graph. In Proceedings of the 2012 IEEE 2nd International Conference on Computer Science & Network Technology (ICCSNT), Changchun, China, 29–31 December 2012; pp. 1085–1090. [Google Scholar]
- Munir, R.; Disso, J.P.; Awan, I.; Mufti, M.R. A quantitative measure of the security risk level of enterprise networks. In Proceedings of the 2013 IEEE 8th International Conference on Broadband & Wireless Computing, Communication & Applications (BWCCA), Compiegne, France, 28–30 October 2013; pp. 437–442. [Google Scholar]
- Fei, J.; Xu, H. Assessing computer network security with fuzzy analytic hierarchy process. In Proceedings of the 2010 IEEE 2nd International Conference on Advanced Computer Control (ICACC), Shenyang, China, 27–29 March 2010; pp. 204–208. [Google Scholar]
- Li, C. Research on computer network security assessment based on fuzzy analytic hierarchy process. In Proceedings of the 2016 4th International Conference On Machinery, Materials & Computing Technology, Hangzhou, China, 23–24 January 2016; pp. 110–115. [Google Scholar]
- Dongmei, Q.; Chunshu, F. Study on network security assessment based on analytical hierarchy process. In Proceedings of the 2011 IEEE International Conference On Electronics, Communications & Control (ICECC), Ningbo, China, 9–11 September 2011; pp. 2320–2323. [Google Scholar]
- Feng, N.; Li, M. An information systems security risk assessment model under uncertain environment. Appl. Soft Comput. 2011, 11, 4332–4340. [Google Scholar] [CrossRef]
- Gao, H.; Zhu, J.; Li, C. The analysis of uncertainty of network security risk assessment using Dempster–Shafer theory. In Proceedings of the 2008 IEEE 12th International Conference On Computer Supported Cooperative Work In Design (CSCWD), Xi’an, China, 16–18 April 2008; pp. 754–759. [Google Scholar]
- Zedeh, L. Fuzzy sets. Information & Control 1965, 8, 338–353. [Google Scholar]
- Jiang, W.; Wei, B.; Liu, X.; Li, X.; Zheng, H. Intuitionistic fuzzy power aggregation operator based on entropy and its application in decision making. Int. J. Intell. Syst. 2018, 33, 49–67. [Google Scholar] [CrossRef]
- Jiang, W.; Wei, B. Intuitionistic fuzzy evidential power aggregation operator and its application in multiple criteria decision-making. Int. J. Syst. Sci. 2018, 49, 582–594. [Google Scholar] [CrossRef]
- Pawlak, Z. Rough sets. Int. J. Parallel Program. 1982, 11, 341–356. [Google Scholar] [CrossRef]
- Dubois, D.; Prade, H. Possibility Theory: An Approach to Computerized Processing of Uncertainty; Plenum Press: New York, NY, USA, 1988. [Google Scholar]
- Dempster, A.P. Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat. 1967, 38, 325–339. [Google Scholar] [CrossRef]
- Shafer, G. A Mathematical Theory of Evidence; Princeton University Press: Princeton, NJ, USA, 1976. [Google Scholar]
- Deng, Y. Generalized evidence theory. Appl. Intell. 2015, 43, 530–543. [Google Scholar] [CrossRef]
- Jiang, W.; Zhan, J. A modified combination rule in generalized evidence theory. Appl. Intell. 2017, 46, 630–640. [Google Scholar] [CrossRef]
- Deng, X.; Xiao, F.; Deng, Y. An improved distance-based total uncertainty measure in belief function theory. Appl. Intell. 2017, 46, 898–915. [Google Scholar] [CrossRef]
- Deng, Y.; Shi, W.; Zhu, Z.; Liu, Q. Combining belief functions based on distance of evidence. Decis. Support Syst. 2004, 38, 489–493. [Google Scholar]
- Jiang, W.; Chang, Y.; Wang, S. A method to identify the incomplete framework of discernment in evidence theory. Math. Prob. Eng. 2017, 2017, 7635972. [Google Scholar] [CrossRef]
- Deng, X.; Jiang, W. An evidential axiomatic design approach for decision making using the evaluation of belief structure satisfaction to uncertain target values. Int. J. Intell. Syst. 2018, 33, 15–32. [Google Scholar] [CrossRef]
- Deng, X.; Deng, Y. D-AHP method with different credibility of information. Soft Comput. 2018. [Google Scholar] [CrossRef]
- Jiang, W.; Xie, C.; Zhuang, M.; Tang, Y. Failure mode and effects analysis based on a novel fuzzy evidential method. Appl. Soft Comput. 2017, 57, 672–683. [Google Scholar] [CrossRef]
- Zheng, X.; Deng, Y. Dependence assessment in human reliability analysis based on evidence credibility decay model and IOWA operator. Ann. Nuclear Energy 2018, 112, 673–684. [Google Scholar] [CrossRef]
- Xu, H.; Deng, Y. Dependent evidence combination based on Shearman coefficient and Pearson coefficient. IEEE Access 2018. [Google Scholar] [CrossRef]
- Deng, X.; Han, D.; Dezert, J.; Deng, Y.; Shyr, Y. Evidence combination from an evolutionary game theory perspective. IEEE Trans. Cybern. 2016, 46, 2070–2082. [Google Scholar] [CrossRef] [PubMed]
- Yu, C.; Yang, J.; Yang, D.; Ma, X.; Min, H. An improved conflicting evidence combination approach based on a new supporting probability distance. Expert Syst. Appl. 2015, 42, 5139–5149. [Google Scholar] [CrossRef]
- Murphy, C.K. Combining belief functions when evidence conflicts. Decis. Support Syst. 2000, 29, 1–9. [Google Scholar] [CrossRef]
- Deng, Y. Deng entropy. Chaos Solitons Fractals 2016, 91, 549–553. [Google Scholar] [CrossRef]
- Harmanec, D.; Klir, G.J. Measuring total uncertainty in Dempster–Shafer theory: A novel approach. Int. J. Gen. Syst. 1994, 22, 405–419. [Google Scholar] [CrossRef]
- Jousselme, A.L.; Liu, C.; Grenier, D.; Bossé, É. Measuring ambiguity in the evidence theory. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 2006, 36, 890–903. [Google Scholar] [CrossRef]
- Jiang, W.; Wang, S. An uncertainty measure for interval-valued evidences. Int. J. Comput. Commun. Control 2017, 12, 631–644. [Google Scholar] [CrossRef]
- Wang, X.; Song, Y. Uncertainty measure in evidence theory with its applications. Appl. Intell. 2017. [Google Scholar] [CrossRef]
- Yang, Y.; Han, D. A new distance-based total uncertainty measure in the theory of belief functions. Knowl. Based Syst. 2016, 94, 114–123. [Google Scholar] [CrossRef]
- Smets, P.; Kennes, R. The transferable belief model. Artif. Intell. 1994, 66, 191–234. [Google Scholar] [CrossRef]
- Zhang, S. A model for evaluating computer network security systems with 2-tuple linguistic information. Comput. Math. Appl. 2011, 62, 1916–1922. [Google Scholar] [CrossRef]
Criteria | Description of the Criteria |
---|---|
Prevention of Malice Software | |
Media Processing and Security | |
Operation Program and Duty | |
Network Management | |
Information and Software, Hardware Exchange | |
Management of Network Access | |
Management of User’s Access | |
Management of Application Access | |
System Access and Monitoring of Usage | |
Effect on Tangible Assets | |
Effect on Intangible Assets |
Bottom Criteria | BPA | |||||||
---|---|---|---|---|---|---|---|---|
VL | L | ML | M | MH | H | VH | ||
0 | 0.1 | 0.1 | 0.2 | 0.2 | 0.3 | 0.1 | 0 | |
0 | 0.1 | 0.1 | 0.2 | 0.2 | 0.2 | 0.1 | 0.1 | |
0 | 0.1 | 0.15 | 0.2 | 0.3 | 0.15 | 0 | 0.1 | |
0 | 0.1 | 0.1 | 0.15 | 0.2 | 0.3 | 0.1 | 0.05 | |
0.1 | 0.1 | 0.1 | 0.2 | 0.3 | 0.1 | 0 | 0.1 | |
0 | 0 | 0.1 | 0.1 | 0.2 | 0.2 | 0.3 | 0.1 | |
0.1 | 0.1 | 0.15 | 0.2 | 0.2 | 0.1 | 0.1 | 0.05 | |
0.1 | 0.1 | 0.1 | 0.1 | 0.2 | 0.2 | 0.1 | 0.1 | |
0 | 0.1 | 0.1 | 0.2 | 0.3 | 0.2 | 0.1 | 0 | |
0 | 0.1 | 0.1 | 0.1 | 0.3 | 0.2 | 0.1 | 0.1 | |
0 | 0 | 0.1 | 0.1 | 0.2 | 0.2 | 0.3 | 0.1 |
Middle Level Criteria | Subjective Weights | Bottom Criteria | Subjective Weights |
---|---|---|---|
0.310 | 0.157 | ||
0.393 | |||
0.164 | |||
0.172 | |||
0.114 | |||
0.580 | 0.281 | ||
0.312 | |||
0.280 | |||
0.127 | |||
0.110 | 0.670 | ||
0.330 |
Bottom Criteria | Uncertainty Values | Objective Weights |
---|---|---|
0.1247 | 0.2847 | |
0.2139 | 0.1660 | |
0.2093 | 0.1697 | |
0.1681 | 0.2112 | |
0.2109 | 0.1684 | |
0.2087 | 0.2063 | |
0.1729 | 0.2491 | |
0.2161 | 0.1993 | |
0.1247 | 0.3453 | |
0.2109 | 0.4974 | |
0.2087 | 0.5026 |
Bottom Criteria | Subjective Weights | Objective Weights | Comprehensive Weights |
---|---|---|---|
0.1570 | 0.2847 | 0.2312 | |
0.3930 | 0.1660 | 0.3375 | |
0.1640 | 0.1697 | 0.1440 | |
0.1720 | 0.2112 | 0.1879 | |
0.1140 | 0.1684 | 0.0993 | |
0.2810 | 0.2063 | 0.2463 | |
0.3120 | 0.2491 | 0.3302 | |
0.2800 | 0.1993 | 0.2371 | |
0.1270 | 0.3453 | 0.1863 | |
0.6700 | 0.4974 | 0.6677 | |
0.3300 | 0.5026 | 0.3323 |
VL | L | ML | M | MH | H | VH | ||
---|---|---|---|---|---|---|---|---|
0.0099 | 0.1000 | 0.1072 | 0.1906 | 0.2243 | 0.2248 | 0.0757 | 0.0675 | |
0.0567 | 0.0754 | 0.1165 | 0.1517 | 0.2186 | 0.1670 | 0.1493 | 0.0649 | |
0 | 0.0668 | 0.1000 | 0.1000 | 0.2668 | 0.2000 | 0.1665 | 0.1000 |
VL | L | ML | M | MH | H | VH | ||
---|---|---|---|---|---|---|---|---|
0.0002 | 0.0227 | 0.0281 | 0.1991 | 0.3682 | 0.3713 | 0.0102 | 0.0002 | |
0.0132 | 0.0242 | 0.0699 | 0.1431 | 0.4230 | 0.1885 | 0.1369 | 0.0012 | |
0 | 0.0504 | 0.0849 | 0.0849 | 0.3524 | 0.2264 | 0.1727 | 0.0283 |
Middle Level Criteria | Subjective Weights | Objective Weights | Comprehensive Weights |
---|---|---|---|
0.31 | 0.3692 | 0.3291 | |
0.58 | 0.3487 | 0.5816 | |
0.11 | 0.2821 | 0.0892 |
VL | L | ML | M | MH | H | VH | ||
---|---|---|---|---|---|---|---|---|
0.0077 | 0.0261 | 0.0575 | 0.1564 | 0.3986 | 0.2521 | 0.0984 | 0.0033 | |
m | 0 | 0.0003 | 0.0026 | 0.0468 | 0.7468 | 0.1915 | 0.0121 | 0 |
VL | L | ML | M | MH | H | VH | |
---|---|---|---|---|---|---|---|
0 | 0.0003 | 0.0026 | 0.0468 | 0.7468 | 0.1915 | 0.0121 |
VL | L | ML | M | MH | H | VH | ||
---|---|---|---|---|---|---|---|---|
0.0023 | 0.0886 | 0.0932 | 0.2082 | 0.2439 | 0.2321 | 0.0743 | 0.0575 | |
0.0474 | 0.0516 | 0.1151 | 0.1577 | 0.3033 | 0.1656 | 0.1452 | 0.014 | |
0 | 0.0825 | 0.0971 | 0.0971 | 0.3058 | 0.2088 | 0.1263 | 0.0825 |
Attributes | BPA |
---|---|
Attributes | BPA |
---|---|
Attributes | BPA |
---|---|
Attributes | BPA |
---|---|
Network Security System | Comprehensive Weights of Attributes |
---|---|
Network Security System | The Evaluation Results (Expressed by BPA) |
---|---|
Linguistic Variable | Fuzzy Numbers |
---|---|
(EP) | (0,0,1,2) |
(VP) | (1,2,2,3) |
(P) | (2,3,4,5) |
(M) | (4,5,5,6) |
(G) | (5,6,7,8) |
(VG) | (7,8,8,9) |
(GP) | (8,9,10,10) |
Network Security System | The Total Score | BPA |
---|---|---|
7.9622 | ||
3.1515 | ||
4.0068 | ||
6.2797 | ||
Weight () | Scores () | Ranking |
---|---|---|
(0.10,0.25) | (8.6818,2.6929,5.0611,7.2044) | |
(0.15,0.20) | (8.1930,2.7884,3.8953,5.8952) | |
(0.20,0.15) | (8.4226,3.0275,3.9050,6.1114) | |
(0.25,0.10) | (7.9419,3.5380,3.0057,5.2914) | |
(0.30,0.05) | (8.4870,4.0109,4.5264,4.2198) |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Duan, Y.; Cai, Y.; Wang, Z.; Deng, X. A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty. Appl. Sci. 2018, 8, 428. https://doi.org/10.3390/app8030428
Duan Y, Cai Y, Wang Z, Deng X. A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty. Applied Sciences. 2018; 8(3):428. https://doi.org/10.3390/app8030428
Chicago/Turabian StyleDuan, Yancui, Yonghua Cai, Zhikang Wang, and Xinyang Deng. 2018. "A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty" Applied Sciences 8, no. 3: 428. https://doi.org/10.3390/app8030428
APA StyleDuan, Y., Cai, Y., Wang, Z., & Deng, X. (2018). A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty. Applied Sciences, 8(3), 428. https://doi.org/10.3390/app8030428