期刊文献+

基于模糊聚类的无权值风险综合评判算法 被引量:5

Fuzzy-clustering-based unweighted risk overall evaluation algorithm
原文传递
导出
摘要 风险评估通过分析不确定的风险因素得到确定的风险评价,如果存在多个风险,需要实施风险聚合.传统风险聚合方法依赖风险权值,在分布式环境中较难具有客观性,尤其对于移动环境,因为移动节点具有移动性和随机性.提出补偿竞争风险聚合算法(CCRAA),CCRAA的基本思想是模糊聚类,对风险值进行补偿以减少其与聚类中心的距离,使补偿后的风险值向聚类中心聚集,取最大风险值和最小风险值的平均值为聚合风险.CCRAA使风险和值不变,不影响聚合风险的大小,但避免了传统风险聚合方法可能产生风险极值或对风险权值的依赖.使用实验证明CCRAA具有优于传统方法的聚合效果和稳定性. Risk evaluation gave a certain result by analyzing uncertain risk factors and risk aggregation was requested if there were multiple risks. Traditional risk aggregation method, which rested on the risk weights, was difficult to be objective in the distributed environment, especially in the mobile environment because mobile nodes were mobile and random. Compensational competing risk aggregation algorithm (CCRAA) building on the basic concept of fuzzy clustering is proposed in this paper, where the risk value is compensated to shorten its distance from the clustering center so that the compensated risk value converges toward the clustering center and the aggregated risk is determined as the average of the maximal and minimal risk values. CCRAA averts the dependency in the traditional risk aggregation method on risk limits or weights while it leaves the sum of risks unchanged and has no effect on the magnitude of the aggregated risk. A test is described to have demonstrated that CCRAA is superior to the traditional method with respect to the effectiveness in aggregation and stability.
出处 《系统工程理论与实践》 EI CSSCI CSCD 北大核心 2015年第8期2137-2143,共7页 Systems Engineering-Theory & Practice
基金 国家自然科学基金(61370073) 湖南省自然科学基金(12JJ6056)
关键词 风险评估 风险聚合 风险权值 模糊聚类 补偿竞争 risk evaluation risk aggregation risk weight fuzzy clustering compensational competition
  • 相关文献

参考文献18

  • 1Celikel E, Kantarcioglu M, Thuraisinghan B, et al. Managing risks in RBAC employed distributed environ- ments[C]// On the Move to Meaningful Interuct Systems, Vilamoura, 2007: 1548-1566. 被引量:1
  • 2Celikel E, Kantarcioglu M, Thuraisingham B, et al. A risk management approach to RBAC[J]. Risk and Decision Analysis, 2009, 1(11): 21-33. 被引量:1
  • 3Molloy I, Dickens L, Charles M, et al. Risk-based security decisions under uncertainty[C]//2012 ACM Conference on Data and Application Security and Privacy, San Antonio, 2012: 157-168. 被引量:1
  • 4葛海慧,肖达,陈天平,杨义先.基于动态关联分析的网络安全风险评估方法[J].电子与信息学报,2013,35(11):2630-2636. 被引量:23
  • 5Luo J. Risk based mobile access control (RiBMAC) policy framework[C]//Military Communications Conference, Baltimore, 2011: 1448-1453. 被引量:1
  • 6Sharma M, Bai Y, Chung S, et al. Using risk in access control for cloud-assisted eHealth[C]// International Conference on High Performance Computing and Communications, Liverpool, 2012: 1047-1052. 被引量:1
  • 7Nissanke N, Khayat E J. Risk based security analysis of permissions in RBAC[C]//2nd International Workshop on Security in Information Systems, 2004: 332-341. 被引量:1
  • 8Nawarathna U, Kodithuwakku S R. A fuzzy role based access control model for database security[C]//Proceed- ings of the International Conference on Information and Automation, Colombo, 2005: 313-318. 被引量:1
  • 9Chapin P, Skalka C, Wang X S. Risk assessment in distributed authorization[C]//Proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering, Alexandria, 2005: 33-41. 被引量:1
  • 10Weili H, Qun N, Hong C. Apply Measurable risk to strengthen security of a role-based delegation support- ing workflow Ssystem[C]// Proceedings of the 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, London, 2009: 45-52. 被引量:1

二级参考文献21

  • 1孙波,赵庆松,孙玉芳.TRDM——具有时限的基于角色的转授权模型[J].计算机研究与发展,2004,41(7):1104-1109. 被引量:26
  • 2徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 4翟征德.基于量化角色的可控委托模型[J].计算机学报,2006,29(8):1401-1407. 被引量:33
  • 5Cuppens F and Miege A. Alert correlation in a cooperative intrusion detection framework[C]. Proceedings 2002 IEEE Symposium on Security and Privacy. Oakland, 2002: 202- 215. 被引量:1
  • 6Qin X Z and Lee W K. Statistical causality analysis of INFOSEC alert data[C]. Recent Advances in Intrusion Detection 6th International Symposium, Pittsburgh, 2003, Vol. 2820: 73-93. 被引量:1
  • 7Gorodetsky V, Karsaev 0, and Samoilov V. On-line update of situation assessment based on asynchronous data streams[C]. Knowdedge-Based Intelligent Information and Engineering Systems, Wellington, 2004, Vol. 3213: 1136- 1142. 被引量:1
  • 8Yegneswaran V, Barford P, and Paxson V. Using Honeynets for Internet situational awareness[CIOL]. Proceedings of the Fourth Workshop on Hot Topics in Networks, Berlin, 2005. http://www.icir .otg] vein] papers 1 sit-aware- hotnet05. pdf. 被引量:1
  • 9Hariri S, Qu G Z, Dharrnagadda T, et al. Impact analysis of faults and attacks in large-scale networks[J]. IEEE Security & Privacy, 2003, 1(5): 49-54. 被引量:1
  • 10Mohammad Salim Ahmed, Ehab Al-Shaer , Mohamed Taibah, et al. Objective risk evaluation for automated security management[J]. Journal of Network and Systems Management, 2011, 19(3): 343-366. 被引量:1

共引文献36

同被引文献39

引证文献5

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部