Information security evaluation of system based on Bayesian network

Z. Q. Cai, J. B. Zhao, Y. Li, S. B. Si, M. N. Ni

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

This paper proposed an information security Bayesian network (IBN) model to evaluate the system information security. First, an information security hierarchy model is put forward with the analytical hierarchy process based on the characteristics of equipment development enterprises information systems and information security evaluation criteria. Then, according to the definition of Bayesian network, the IBN is built by transforming the information security hierarchy model into Bayesian network with structure and probability distributions. Finally, a case study is implemented to demonstrate the proposed evaluation method. The results show that the IBN model provides a convenient framework to evaluate the system information security.

Original languageEnglish
Title of host publicationIEEM 2015 - 2015 IEEE International Conference on Industrial Engineering and Engineering Management
PublisherIEEE Computer Society
Pages315-319
Number of pages5
ISBN (Electronic)9781467380669
DOIs
StatePublished - 18 Jan 2016
EventIEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2015 - Singapore, Singapore
Duration: 6 Dec 20159 Dec 2015

Publication series

NameIEEE International Conference on Industrial Engineering and Engineering Management
Volume2016-January
ISSN (Print)2157-3611
ISSN (Electronic)2157-362X

Conference

ConferenceIEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2015
Country/TerritorySingapore
CitySingapore
Period6/12/159/12/15

Keywords

  • Bayesian network
  • Information security
  • analytical hierarchy process
  • probability

Fingerprint

Dive into the research topics of 'Information security evaluation of system based on Bayesian network'. Together they form a unique fingerprint.

Cite this