Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fuzzy analytical hierarchy process-based ICS information safety assessment method

An information security, fuzzy-level technology, applied in the field of information security risk assessment and evaluation in the industrial industry, can solve the problems of strong subjectivity of experts and inconvenient processing of the weight relationship of evaluation factors, so as to avoid subjective influence and improve objectivity and effectiveness. , the effect of easy comparison

Inactive Publication Date: 2018-08-24
GUILIN UNIV OF ELECTRONIC TECH +2
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The information security risk assessment method based on the Bayesian network is a method that combines expert knowledge with probability to describe each assessment factor, which can assess the overall risk of the system and single-factor risk. The reasoning mode of human beings can describe the process quantitatively. Combined with expert knowledge, it can describe each evaluation factor with a probability method, and can evaluate the overall risk of the system and single-factor risk. The information security evaluation method based on the analytic hierarchy process can better deal with various The weight relationship between various evaluation factors, but the subjectivity of experts in the evaluation results is strong, and the weight relationship between various evaluation factors is not easy to handle

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fuzzy analytical hierarchy process-based ICS information safety assessment method
  • Fuzzy analytical hierarchy process-based ICS information safety assessment method
  • Fuzzy analytical hierarchy process-based ICS information safety assessment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0017] see figure 1 , an ICS information security assessment method based on fuzzy analytic hierarchy process, including

[0018] Determine the evaluation model and build an industrial control system evaluation model.

[0019] Determine the scoring level, and set the scoring level as five risk levels: strong risk level, high risk level, medium risk level, low risk level, and weak risk level.

[0020] Wherein, the strong risk level of the determined scoring l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fuzzy analytical hierarchy process-based ICS information safety assessment method. The method comprises the following steps of assessment model determination, scoring grade determination, assessment factor weight ratio determination, expert assessment and result analysis. The method has the beneficial effects that determined assessment factor weight ratios are combined with a gray fuzzy theory to construct each assessment factor risk grade matrix so that a risk grade membership of each assessment factor can be judged and the assessment of experts is facilitated; the assessment factors are quantified by the determined assessment factor weight ratios and then compared in pairs; the assessment factors are quantified by numbers 1-9, and according to the different numbers, the comparison results can be same, slightly strong, relatively strong, obviously strong and absolutely strong, so that the comparison is facilitated; and safety protection capability grades of industrial control systems are obtained through a scoring matrix and the assessment factor weight ratios, so that subjective influences, on assessment results, of assessment experts are avoided to a certain extent, and the objectivity and effectiveness of the assessment results are improved.

Description

technical field [0001] The invention relates to an assessment method, in particular to an ICS information security assessment method based on fuzzy analytic hierarchy process, and belongs to the technical field of information security risk assessment in industrial industries. Background technique [0002] The information security risk assessment method based on the Bayesian network is a method that combines expert knowledge with probability to describe each assessment factor, which can assess the overall risk of the system and single-factor risk. The reasoning mode of human beings can describe the process quantitatively. Combined with expert knowledge, it can describe each evaluation factor with a probability method, and can evaluate the overall risk of the system and single-factor risk. The information security evaluation method based on the analytic hierarchy process can better deal with various The weight relationship between various evaluation factors, but the subjectivi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06Q10/06
CPCG06F21/577G06Q10/0635
Inventor 夏冀杨建军范科峰刘贤刚姚相振李琳
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products