Next Article in Journal
A PSF-Shape-Based Beamforming Strategy for Robust 2D Motion Estimation in Ultrafast Data
Next Article in Special Issue
Novel Guidance CPS Based on the FatBeacon Protocol
Previous Article in Journal
Forward and Inverse Studies on Scattering of Rayleigh Wave at Surface Flaws
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty

School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2018, 8(3), 428; https://doi.org/10.3390/app8030428
Submission received: 24 January 2018 / Revised: 28 February 2018 / Accepted: 9 March 2018 / Published: 13 March 2018
(This article belongs to the Special Issue Security and Privacy for Cyber Physical Systems)

Abstract

:
Nowadays, computer networks are playing a more and more important role in people’s daily lives. Meanwhile, the security of computer networks has also attracted widespread concern. However, up to now, there is no universal and effective assessment approach for computer network security. Therefore, a novel network security risk assessment approach by combining subjective and objective weights under uncertainty is proposed. In the proposed evaluation approach, the uncertainty of evaluation data is taken into account, which is translated into objective weights through an uncertainty measure. By combining the subjective weights of evaluation criteria and the objective weights of evaluation data, the final weights can be obtained. Then, Dempster–Shafer (D-S) evidence theory and pignistic probability transformation (PPT) are employed to derive a consensus decision for the degree of the network security risk. Two illustrative examples are given to show the efficiency of the proposed approach. This approach of risk assessment, which combines subjective and objective weights, can not only effectively evaluate computer network security, but also be widely used in decision-making.

1. Introduction

The cyber physical system is a multi-dimensional complex system that integrates computing, the network and the physical environment, and it has a wide range of applications [1,2]. When it comes to computing, many studies such as research on cloud computing have been conducted [3]. Furthermore, network security is also a rather significant component of cyber physical systems. The last few years have witnessed a burst in the exploration of network security, such as network security studies of SCADA (supervisory control and data acquisition) systems [4], the Internet of Things [5], software-defined networks [6], wireless sensor networks [7] and the smart grid [8]. Besides, many studies have researched the security of computer networks because of the emergence of a large number of cyber crimes, which are researched in many studies [9,10]. To combat cyber crimes vigorously, studies regarding computer forensics [11,12], virus prevention technologies [13], security visualization for computer network logs [14], intrusion detection [15], etc., have been performed in recent years. In addition, approaches of computer network security risk assessment are also of great significance to improve computer network security.
There is a variety of approaches to assess the security of computer networks, such as game theory [16], RBF (radial basis function) neural networks [17], attack graphs [18], vulnerability correlation graphs [19], and so on. In [20], a quantitative measure of the security risk level of networks is proposed to assess network security. Firstly, the vulnerability scanning tool is used to scan the network to determine the vulnerability of each node in the network. Then, the probability approach is employed to calculate the overall security risk level of the sub-networks and the entire network. Besides, the (fuzzy) analytic hierarchy process is also used for network security assessment [21,22,23]. In this evaluation method, the index system of network security risk assessment is first established, and then, the (fuzzy) analytic hierarchy process is applied to obtain the final evaluation results. D-S evidence theory is also an effective tool for assessing network security risk [24,25]. The index system of network security risk assessment is first needed. Then, based on the weights of indexes and the evaluation data of the bottom criteria (expressed by basic probability assignment (BPA)), D-S evidence theory is used to combine evidence from bottom to top to obtain the risk level of network security. Herein, it is worth noting that the key issue of network security risk assessment is how to deal with the uncertainty information. Many solutions such as fuzzy sets theory [26,27,28], rough sets theory [29], possibility theory [30] and D-S evidence theory [31,32,33,34] can be applied to address the problem.
However, to date, there is no universal and effective method of computer network security risk assessment. Of those studies that apply a comprehensive evaluation method to evaluate networks, only the weights of criteria are taken into account, and the weights of evaluation data are simply ignored. Therefore, a novel approach is proposed in this paper by combining subjective weights of criteria and objective weights of evaluation data under uncertainty. Based on the hierarchical structure of computer networks, subjective weights of all criteria and risk values of bottom criteria are given by experts. Then, by using an uncertainty measure i T U I [35], the uncertainty values of bottom evaluation data are derived. Take the reciprocal of uncertainty values, and then, normalize them to get objective weights. After that, combing the subjective and objective weights and using Dempster’s rule of combination [36], the risk values of bottom criteria are fused to be the risk values of the upper level criteria. Using the same method to combine the risk values from bottom to top and applying pignistic probability transformation (PPT) and the principle of maximum membership, the risk level of computer networks is finally derived.
The rest of the article is organized as follows. Section 2 introduces the preliminaries. Section 3 presents the network security risk assessment approach studied in [25] and the new assessment approach implemented in this paper. In Section 4, the validity and robustness of the proposed approach are examined through two numerical examples. Then, the paper is briefly concluded in Section 5.

2. Preliminaries

2.1. Dempster–Shafer Evidence Theory

D-S evidence theory [31,32,37] has many advantages in handling uncertain information and can be applied to many fields such as decision-making [38,39], risk assessment [40], reliability analysis [41], and so on. Firstly, D-S evidence theory allows probability masses to be assigned to not only singletons, but also multiple hypotheses, rather than only singleton subsets in comparison to the probability theory. Secondly, information from different sources can be combined without a prior distribution. Thirdly, instead of being forced to be assigned to some singleton subsets, a certain degree of ignorance can be allowed in some situations. A few basic concepts are introduced as follows:
Let Θ be a set of mutually exclusive and collectively exhaustive events, indicated by:
Θ = θ 1 , θ 2 , , θ i , , θ N
The set Θ is called a frame of discernment. The power set of Θ is indicated by 2 Θ , namely:
2 Θ = , θ 1 , θ 2 , , θ N , θ 1 , θ 2 , , θ 1 , , θ i , , θ 1 , , θ N
If A 2 Θ , A is called a proposition. In the power set 2 Θ , ∅ is called the empty set, the singletons are θ 1 , θ 2 , , θ N , and the multiple hypotheses are θ 1 , θ 2 , , θ 1 , , θ i , , θ 1 , , θ N .
For a frame of discernment Θ , a mass function is a mapping m from 2 Θ to [ 0 , 1 ] , formally defined by:
m : 2 Θ [ 0 , 1 ]
which satisfies the following condition:
m ( ) = 0 a n d A 2 Θ m ( A ) = 1
In D-S evidence theory, a mass function is also called a basic probability assignment (BPA). BPA reflects the degree of support for the proposition A in the recognition framework. If m ( A ) > 0 , A is called a focal element, and the union is called the core of the mass function.
Associated with each BPA, the belief function B e l and plausibility function P l are defined as:
B e l ( A ) = B A m ( B )
P l ( A ) = 1 B e l ( A ¯ ) = B A m ( B )
where A ¯ = Θ A . Obviously, P l ( A ) B e l ( A ) , for each A 2 Θ .
Assume there are two BPAs indicated by m 1 and m 2 ; Dempster’s rule of combination is used to combine them as follows:
m ( A ) = 1 1 K B C = A m 1 ( B ) m 2 ( C ) , A 0 , A =
where:
K = B C = m 1 ( B ) m 2 ( C )
In D-S evidence theory, K is a coefficient to measure the conflict between pieces of evidence. Note that Dempster’s rule of combination is only applicable to two such BPAs that satisfy the condition K < 1 , and there are many other combination rules [42,43]. It should also be noted that the conflict in D-S evidence theory is an open issue. Many methods have been proposed to address this issue [33,44].

2.2. Weighted Average Combination Method of Combining Mass Functions

Dempster’s rule of combination will yield counter-intuitive results when combining highly conflicting evidence. Of the alternative methods that address the problem, Murphy proposed an averaging combination method [45]. However, the weights of evidence are considered equal in this method, which does not fit most of the actual situations. Therefore, a weighted average combination method of combining mass functions was proposed in [36]. This method based on the weights of evidence considers the importance of different evidence and can efficiently handle conflicting evidence with better performance of convergence. The definition is as follows.
In a real system, the importance of each piece of evidence may be different. Suppose that there are n pieces of evidence, denoted as m i , and the weight of each piece of evidence is w i ( i = 1 , 2 , 3 , . , n ) . The weighted average of evidence m ¯ is given as:
m ¯ = i = 1 n ( m i × w i )
The final result can be obtained by using the classical Dempster’s rule of combination (Equations (7) and (8) to combine the weighted average of evidence m ¯ ( n 1 ) times. As can be seen from Equation (9), if the weight coefficient of a piece of evidence is greater, this evidence will have a larger effect on the final combination result. On the contrary, if the weight coefficient of a piece of evidence is lower, this evidence should have a smaller effect on the final combination result.

2.3. Uncertainty Measure in D-S Evidence Theory

Uncertainty quantification of mass functions is also a crucial and open issue in D-S evidence theory. Many solutions are proposed to solve this problem such as Deng entropy [46], aggregated uncertainty A U [47], the ambiguity measure A M [48], uncertainty measures proposed in [49,50], and so on. In this paper, a distance-based uncertainty measure i T U I [35] is employed to quantify the uncertainty of mass functions in D-S evidence theory, which is an improvement of uncertainty measure T U I [51]. This uncertainty measure is defined as below.
Suppose that m is a BPA over FOD (frame of discernment) Θ = θ 1 , θ 2 , , θ i , , θ n ; the total uncertainty measure for m is defined as:
i T U I ( m ) = i = 1 n d E I ( [ 0 , 0 ] , [ 0 , 1 ] ) d E I ( [ B e l ( θ i ) , P l ( θ i ) ] , [ 0 , 1 ] ) d E I ( [ 0 , 0 ] , [ 0 , 1 ] )
where d E I is the Euclidean distance between two interval numbers:
d E I ( [ a 1 , b 1 ] , [ a 2 , b 2 ] ) = ( a 1 a 2 ) 2 + ( b 1 b 2 ) 2
Here, since d E I ( [ 0 , 0 ] , [ 0 , 1 ] ) = 1 , Equation (10) can also be written as:
i T U I ( m ) = i = 1 n [ 1 d E I ( [ B e l ( θ i ) , P l ( θ i ) ] , [ 0 , 1 ] ) ]
In this paper, the normalization is done. Namely, the total uncertainty measure for m is redefined as:
i T U I ( m ) = i = 1 n [ 1 d E I ( [ B e l ( θ i ) , P l ( θ i ) ] , [ 0 , 1 ] ) ] n

2.4. Pignistic Probability Transformation

In Smets’s transferable belief model (TBM) [52], the probability distribution B e t P after pignistic probability transformation (PPT) is as follows.
B e t P ( θ i ) = B Θ θ i B B × m ( B ) , θ i Θ
The essence of PPT is to convert a mass function to a probability distribution. It can be seen from Equation (14) that beliefs of multiple-hypothesis focal elements are given to singletons according to the principle of equality.

3. Approach of Network Security Risk Assessment

3.1. The Network Security Risk Assessment Approach Proposed by Gao et al.

In [25], an approach for assessing network security was proposed. The specific assessment process can be divided into the following steps.

3.1.1. Establish the Index System of the Network Risk

The index system is a hierarchical structure model, which divides the factors related to network risk into three levels. The framework of the index system of network security risk assessment is shown in Figure 1. The first level of the index system is network security risk assessment, also called the target level. In the second level, there are three criteria, communication and operation, access control and assets, respectively, which are all divided into 2∼5 smaller criteria at the bottom level (see Table 1).

3.1.2. Use D-S Evidence Theory to Fuse Mass Functions

In this approach, the weights of evidence are taken into account when using D-S evidence theory to fuse mass functions.
Let the set of evidence be E = E 1 , E 2 , , E n . The weight coefficient of evidence E i is ω i , where ω i 0 , 1 and i = 1 n ω i = 1 . Let ω max = max ω 1 , ω 2 , , ω n and the relative weight vector W = ω 1 , ω 2 , , ω n / ω max . Then, the “ratio” of BPA can be determined as α i 0 α i 1 , where 1 α i = ω i / ω max , i = 1 , 2 , , n .
Use the “ratio” to discount BPA. The BPA after adjustment is:
m i A = 1 α i m i A , A Θ m i Θ = 1 α i m i Θ + α i
Suppose the risk rank of the network is divided as X = x 1 , x 2 , , x k . Ascertain all layer’s weights and BPA m i j ( x h ) of the bottom layer with regard to x h ( h = 1 , 2 , , k ) , where m i j X represents the uncertainty. Use Equation (15) to adjust BPA, and then, use Equations (7) and (8) to combine evidence from bottom to top. Finally, BPA m x h of the network risk can be obtained ( h = 1 , 2 , , k ). Note that BPA of middle level criteria still needs to be adjusted before being combined.

3.1.3. Obtain the Network Security Risk Value

After getting m x h , the belief function B e l x h of network risk can be obtained by Equation (5). At last, the network security risk value can be obtained through the risk calculation formula:
R = h = 1 k P x h B e l x h
where P X = p x 1 , p x 2 , , p x k represents the damage degree once the risk events happen. p x h represents the average value of damage degree corresponding to the risk rank x h . Its range is 0 p x h 1 .

3.1.4. Discussion of the Work Done by Gao et al.

In the approach proposed by Gao et al., the uncertainty of BPA is measured by the probability mass assigned to the complete set, which is not a very effective quantification of uncertainty. Moreover, only the subjective weights of criteria have been considered, which makes the subjectivity of the assessment very large. Therefore, in the novel assessment approach proposed in this paper, we employ an uncertainty measure to more accurately quantify the uncertainty of BPA and transform the uncertainty into objective weights. In addition, the weighted average combination method of combining mass functions, which has a good performance of convergence, is applied to the risk assessment. The process of the novel network security risk assessment approach is shown as below.

3.2. The Novel Network Security Risk Assessment Approach Proposed in This Paper

The purpose of this paper is to propose a better approach of network security risk assessment. The process of the novel network security risk assessment approach can be divided into six steps, as depicted in Figure 2.

3.2.1. Establish a Hierarchical Structure Model

The establishment of hierarchical structure model is the premise of network security risk assessment. In this paper, there are three levels of the hierarchy structure model, as depicted in Figure 1 [25].

3.2.2. Make an Evaluation Expressed by BPA

According to the hierarchical structure of computer network security risk assessment, the evaluation of the network, specifically the risk values of bottom criteria, should be given by experts and be expressed by BPA.

3.2.3. Determine the Subjective and Objective Weights

Assume that the subjective weights of the criteria are given by experts, which are known in advance. The objective weights are determined by the uncertainty of the evaluation data. The calculation method is as follows.
Let Θ = {very low (VL), low (L), middle low (ML), middle (M), middle high (MH), high (H), very high (VH)} represent seven risk levels of network security assessment. For the bottom criteria, suppose the subjective weight and BPA of the criteria a i j are w i j and m i j , respectively ( i = 1 , 2 , 3 ; j = 1 , 2 , ). By using Equation (13), the uncertainty of each piece of evidence (evaluation data), denoted as U i j ( i = 1 , 2 , 3 ; j = 1 , 2 , ), can be calculated. In view of the larger uncertainty of evidence and the less useful information provided, the objective weight u i j can be obtained by:
u i j = 1 U i j j = 1 n 1 U i j

3.2.4. Obtain Comprehensive Weights

In this part, subjective weights of criteria and objective weights of evaluation data are combined to obtain the comprehensive weights. That is to say, the final weights of bottom criteria consist of two parts: the subjective weights known in advance and the objective weights to consider the uncertainty of mass functions, which contributes to decreasing the negative influence of expert’s extreme subjectivity on the evaluation data. The comprehensive weights are indicated by:
z i j = w i j × u i j j = 1 n w i j × u i j

3.2.5. Use Weighted Average Combination Rule to Combine Mass Functions

Based on the comprehensive weights z i j and BPAs ( m i j ) of the bottom criteria, the weighted average combination rule is used to combine the evidence in this layer. When the combination of evidence is finished, the results of the combination will be regarded as the mass functions (BPAs) of the middle level criteria. Similarly, we can calculate the comprehensive weights of criteria in this layer and combine the evidence to obtain the evaluation result, which is expressed by BPA. Besides, the uncertainty of the evaluation result can also be quantified by Equation (13).

3.2.6. Obtain the Risk Level of Computer Networks

Through above five steps, the BPA of network security risk assessment can be obtained. In this paper, by Equation (14), PPT is employed to convert the mass function into a probability distribution. Then, according to the principle of maximum membership, the risk level of computer networks is finally derived.

4. Case Studies

4.1. An Example of Network Security Risk Assessment

In this subsection, a numerical example from [25] is presented to illustrate the procedure of the proposed approach of evaluating network security.

4.1.1. Establish the Hierarchical Structure of Computer Networks

Considering communication, access and assets, three parts that are of great significance to computer network security, the hierarchical structure of computer network security risk assessment is established, as shown in Figure 1 [25].

4.1.2. Make an Evaluation Expressed by BPA

The BPAs of bottom criteria are given by experts, detailed in Table 2 [25].

4.1.3. Determine the Subjective and Objective Weights

The subjective weights of criteria are given by experts in advance (see Table 3 [25]).
For the bottom criteria, the uncertainty of each piece of evidence, denoted as U i j , is calculated by Equation (13), and the objective weights u i j are obtained by Equation (17) (see Table 4).

4.1.4. Obtain Comprehensive Weights

Based on the subjective and objective weights of bottom criteria, the comprehensive weights are derived by Equation (18), detailed in Table 5.

4.1.5. Use Weighted Average Combination Rule to Combine the Mass Functions

On the basis of BPAs ( m i j ) of bottom criteria, along with the comprehensive weights z i j , the weighed average of evidence m i ¯ ( i = 1 , 2 , 3 ) can be calculated by Equation (9). Then, we can use Equations (7) and (8) to combine the weighted average of evidence m 1 ¯ 4 times to obtain m 1 . Similarly, we can derive m 2 and m 3 . Weighted average of evidence m i ¯ and the BPAs of the bottom criteria after combination are detailed in Table 6 and Table 7.
The BPAs of bottom criteria after combination can be viewed as the mass functions of middle level criteria. Similarly, the objective and comprehensive weights of these pieces of evidence can also be obtained (see Table 8). Then, the weighted average of evidence m ¯ is derived. After using Equations (7) and (8) to combine m ¯ 2 times, the combination result, denoted as m, which is also the mass function of network security risk assessment (see Table 9), is obtained. Meanwhile, the uncertainty of the evaluation result can be calculated by Equation (13), which is 0.0630 (quite small).

4.1.6. Obtain the Risk Level of Computer Networks

Through the last five steps, the evaluation result, which is expressed by BPA, is given. Applying PPT to the evaluation, the risk level of computer networks can be determined. The probability distribution after PPT is detailed in Table 10. According to the principle of maximum membership, the risk level of this computer network is middle high (MH).
Besides, the approach used in the study of [25] is also applied to compare with the approach proposed in this paper. As described in Figure 3, if the maximum membership principle is used to determine the risk level in these two approaches, they give the same assessment result, middle high. However, the approach proposed in this paper has a better performance of convergence, and the degree of evidence’s support for middle high (MH) is greater. More importantly, the uncertainty of the evaluation result in the study of [25] can be obtained by Equation (13), which is 0.1336, far greater than that of this paper.
Herein, we also compare and discuss the assessment of each middle level criterion by using these two assessment approach. The corresponding assessment results are shown in Table 7 and Table 11. Using the assessment approach proposed in this paper, the uncertainty of the evaluation results of a 1 , a 2 and a 3 can be obtained by using Equation (13), which is 0.1107, 0.1173 and 0.1450, respectively. In the approach proposed by Gao et al., the corresponding uncertainty is 0.1750, 0.1379 and 0.1953, respectively. Obviously, the use of our assessment approach can reduce the uncertainty of the assessment results. In addition, according to the evaluation data in Table 7, it can be seen that a 1 has the highest risk level, high (H). Therefore, more attention should be paid to a 1 to improve the overall network security.
All the above illustrates that the approach proposed in this paper can effectively assess the security of computer networks, which is the purpose of our study.

4.1.7. The Analysis of the Sensitivity of the Proposed Method

In this part, to examine the robustness of the proposed approach, the sensitivity analysis of the proposed approach is done by changing the BPAs of some criteria.
For example, the evidence of a 15 and a 22 (abbreviated as m 15 and m 22 ) is changed, respectively, by assigning all the probability mass to the complete set Θ , which means maximizing the uncertainty and minimizing the useful information content. Then the evaluation result is calculated. The corresponding results are shown in Figure 4 and Figure 5.
From Figure 4 and Figure 5, it can be seen that although the uncertainty of the evidence increases and the useful information content reduces, the approach proposed in this paper can still make the correct evaluation, which proves that the proposed assessment approach is robust. Besides, changes in the evidence of the criterion with the larger weight will have a greater influence on the assessment result, which accords with this fact.

4.2. Another Example of Network Security System Assessment

Herein, an example of assessing computer network security systems is presented. This assessment is implemented in [53] by using a model with two-tuple linguistic information. In this subsection, evaluation data expressed in linguistic information in [53] are converted into BPAs, and then, the novel assessment approach proposed in this paper is employed to assess network security systems.

4.2.1. Use the Assessment Approach Proposed in This Paper to Assess Network Security Systems

There are four alternative network security systems from different information technology companies, denoted as A i i = 1 , 2 , 3 , 4 , for the military to select. The purpose of assessing these network security systems is to assist the decision-maker in making the best choice. The attributes used to evaluate these computer network security systems are denoted as G i i = 1 , 2 , 3 , 4 , 5 . They are tactics, technology, economy, logistics and strategy, respectively, and their weight vector is ω = 0.1 , 0.15 , 0.2 , 0.3 , 0.25 . There are three decision-makers, denoted as R i i = 1 , 2 , 3 , and their weight vector is λ = 0.3294 , 0.3365 , 0.3341 . The linguistic term set S is defined as S = { s 0 = e x t r e m e l y p o o r ( E P ) , s 1 = v e r y p o o r ( V P ) , s 2 = p o o r ( P ) , s 3 = m e d i u m ( M ) , s 4 = g o o d ( G ) , s 5 = v e r y g o o d ( V G ) , s 6 = e x t r e m e l y g o o d ( E G ) }. The four possible alternatives A i i = 1 , 2 , 3 , 4 are to be evaluated using the linguistic term set S by the three decision-makers under the above five attributes, and construct the decision matrices R k = r i j k 4 × 5 k = 1 , 2 , 3 as follows:
R 1 = G 1 G 2 G 3 G 4 G 5 A 1 A 2 A 3 A 4 S 5 S 6 S 3 S 4 S 6 S 3 S 1 S 2 S 1 S 0 S 4 S 0 S 6 S 3 S 2 S 1 S 5 S 3 S 2 S 3
R 2 = G 1 G 2 G 3 G 4 G 5 A 1 A 2 A 3 A 4 S 3 S 4 S 2 S 6 S 2 S 6 S 6 S 5 S 3 S 1 S 2 S 3 S 6 S 1 S 3 S 1 S 0 S 4 S 4 S 6
R 3 = G 1 G 2 G 3 G 4 G 5 A 1 A 2 A 3 A 4 S 1 S 5 S 6 S 5 S 4 S 2 S 4 S 1 S 4 S 3 S 4 S 2 S 5 S 1 S 6 S 6 S 1 S 0 S 6 S 2
The method to convert the decision matrices into BPAs is as follows.
  • According to the weights of three decision-makers, the evaluation data based on linguistic information are transformed into the probability distribution of linguistic variables.
  • By applying the uncertainty measure i T U I , the uncertainty of the probability distribution obtained in the previous step can be derived. Then, the uncertainty is used to discount the probability distribution to generate BPAs for evaluation.
The following gives an example to clearly illustrate the process of generating BPA for evaluation.
According to the decision matrices, for A 1 , the assessment of its desirability level under G 1 given by three decision-makers R i i = 1 , 2 , 3 is s 5 , s 3 and s 1 , respectively. Then, the probability distribution of A 1 under G 1 is defined as:
m s 1 = 0.3341 m s 3 = 0.3365 m s 5 = 0.3294
By using Equation (13), the uncertainty of the probability distribution can be calculated as 0.1091. Let α = 1 0.1091 = 0.8909 . Then, the final BPA for evaluation is defined as:
m s 1 = α × m s 1 = 0.2976 m s 3 = α × m s 3 = 0.2998 m s 5 = α × m s 5 = 0.2935 m s 1 , s 3 , s 5 = α = 0.1091
Using the same method, the BPAs of A i i = 1 , 2 , 3 , 4 under attributes G i i = 1 , 2 , 3 , 4 , 5 are calculated, as shown in Table 12, Table 13, Table 14 and Table 15. After getting the BPAs for evaluation, the novel assessment approach proposed in this paper is applied to assess the desirability level of network security systems. For each network security system, the subjective weights of attributes G i i = 1 , 2 , 3 , 4 , 5 are known, which is ω = 0.1 , 0.15 , 0.2 , 0.3 , 0.25 . By using Equations (13) and (17), the corresponding objective weights are derived. Then, the comprehensive weights of attributes G i i = 1 , 2 , 3 , 4 , 5 are calculated by Equation (18) (see Table 16). Using the weighted average combination rule to combine the BPAs of these five attributes, the evaluation results of network security systems are obtained (expressed by BPA), as shown in Table 17.
In order to rank these four network security systems, defuzzification is performed to get the total score for each network security system in this example. Suppose in the linguistic term set S = s 0 , s 1 , s 2 , s 3 , s 4 , s 5 , s 6 , every linguistic variable is represented by a trapezoidal fuzzy number given in Table 18 and graphically presented as Figure 6. The centroid defuzzification approach is used, and the defuzzified values for each linguistic variable are P s i = P s 0 , P s 1 , , P s 6 = 0.7778 , 2 , 3.5 , 5 , 6.5 , 8 , 9.2222 .
After obtaining the evaluation results of network security systems expressed by BPA, PPT is carried out. In this example, since the probability mass of BPA is all assigned to singleton sets, B e t P s i = m s i , i = 0 , 1 , , 6 . Then, the total scores for these network security systems can be obtained by Equation (19), which are 8.6818, 2.6929, 5.0611, 7.2044, respectively. Therefore, the desirability level of these four network security systems is ranked as A 1 > A 4 > A 3 > A 2 , and the most desirable alternative is A 1 , which is consistent with results given in [53]. That is to say, the novel assessment approach proposed in this paper is effective and can be applied to decision-making.
R = i = 0 6 P s i × B e t P s i

4.2.2. The Assessment of Network Security Systems by Using the Approach Proposed by Gao et al.

In this part, the assessment approach proposed in [25] is also employed to assess network security systems. The evaluation results (expressed by BPA) and the total scores of network security systems are shown in Table 19. From the total scores given by the assessment approach proposed in [25], the desirability level of these four network security systems is ranked as A 1 > A 4 > A 3 > A 2 , which is also consistent with the results given in [53].
However, for A 1 , A 2 and A 4 , our novel assessment approach gives less uncertainty in the assessment results (BPA) than that of the assessment approach proposed in [25]. By using our approach, the uncertainty of the evaluation results (expressed by BPA) of A 1 , A 2 and A 4 can be obtained by Equation (13), which is 0.0698, 0.0478 and 0.0939, respectively; while the corresponding uncertainty by using the approach proposed by Gao et al. is 0.1001, 0.0949 and 0.1195, respectively.
For A 3 , these two assessment approaches give large differences in the assessment results (see Table 17 and Table 19). In our approach, the comprehensive weights used for evaluation are the combination of subjective weights and objective weights. It can be seen from Table 16 that after considering the uncertainty of each BPA and transforming it into objective weights, the comprehensive weights of attributes G 2 G 5 of A 3 have undergone significant changes. Among them, the weights of G 3 and G 4 are significantly increased, while the weights of G 2 and G 5 are significantly reduced, which leads to the larger probability mass assigned to s 1 and s 6 . That is to say, in our assessment approach, the uncertainty of the evaluation data makes the evaluation results more reasonable by adjusting the comprehensive weights. Therefore, it is more reasonable to assess A 3 by using the approach proposed in this paper.

4.2.3. The Ranking of Network Security Systems When Weights of Attributes Change

Herein, increase the weight (subjective weights) of G 1 , and reduce that of G 5 , while the weights of other attributes are unchanged, to observe the changes of the evaluation results of the network security system. The corresponding evaluation results are shown in Table 20 and Figure 7.
Through Table 20 and Figure 7, we can make the following analysis.
  • The score of A 1 fluctuates at eight points and always ranks first, indicating that A 1 is excellent in both G 1 and G 5 .
  • When the weights of G 1 and G 5 are changed, the score of A 4 decreases obviously. When w e i g h t ( G 1 , G 5 ) = ( 0.3 , 0.05 ) , A 4 ranks third, with a very low score, indicating that A 4 is worse in G 1 and that more attention should be paid to G 1 .
  • Similarly, the score of A 3 also decreases with the change of the weights of G 1 and G 5 , which indicates that there is a larger gap between A 3 and A 1 under G 1 than that under G 5 .
  • The score of A 2 becomes higher and higher, indicating that more efforts should be made in G 5 to improve the overall situation of the network security system.

5. Conclusions

The contribution of this paper is to propose an effective approach of network security risk assessment. One of the crucial problems in the network security risk assessment is how to deal with uncertainty. In this paper, based on the hierarchical structure of network security risk assessment, an uncertainty measure i T U I is applied to quantify the uncertainty of the BPAs of criteria to obtain objective weights, and then, the comprehensive weights are obtained. Besides, the weighted average combination rule is adopted to combine the evidence from bottom to top. According to the probability distribution after using PPT and the principle of maximum membership, the risk level of computer networks can be determined.
Through analyzing the uncertainty of the evaluation results in the two illustrative examples, it is easy to find that the assessment approach proposed in this paper can significantly reduce the uncertainty of the evaluation result and give a clear and correct assessment. In addition, the second example also illustrates that our risk assessment approach of combining subjective and objective weights can be used in the decision-making field. Therefore, the novel risk assessment approach proposed in this paper is a very effective approach for assessing network security and for decision-making.

Acknowledgments

The authors are grateful to the anonymous reviewers for their useful comments and suggestions, which improved this paper. The work was partially supported by the National Natural Science Foundation of China (Program Nos. 61703338, 61671384), the Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2016JM6018), the Project of Science and Technology Foundation, Fundamental Research Funds for the Central Universities (Program No. 3102017OQD020) and the National Training Program of Innovation and Entrepreneurship for Undergraduates (Program No. 201710699190).

Author Contributions

Xinyang Deng and Yancui Duan proposed the idea of this paper. Yancui Duan, Yonghua Cai and Zhikang Wan calculated and analyzed the experimental data, where Yonghua Cai was responsible for programming. Yancui Duan wrote the paper. Xinyang Deng, Yonghua Cai and Zhikang Wan revised and improved the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Monostori, L.; Kádár, B.; Bauernhansl, T.; Kondoh, S.; Kumara, S.; Reinhart, G.; Sauer, O.; Schuh, G.; Sihn, W.; Ueda, K. Cyber-physical systems in manufacturing. CIRP Ann. Manuf. Technol. 2016, 65, 621–641. [Google Scholar] [CrossRef]
  2. Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber–physical system security for the electric power grid. Proc. IEEE 2012, 100, 210–224. [Google Scholar]
  3. Shei, S.; Kalloniatis, C.; Mouratidis, H.; Delaney, A. Modelling secure cloud computing systems from a security requirements perspective. In Proceedings of the International Conference on Trust & Privacy in Digital Business, Porto, Portugal, 07–08 September 2016; pp. 48–62. [Google Scholar]
  4. Patel, S.C.; Bhatt, G.D.; Graham, J.H. Improving the cyber security of SCADA communication networks. Commun. ACM 2009, 52, 139–142. [Google Scholar] [CrossRef]
  5. Mavropoulos, O.; Mouratidis, H.; Fish, A.; Panaousis, E.; Kalloniatis, C. A conceptual model to support security analysis in the internet of things. Comput. Sci. Inf. Syst. 2017, 14, 557–578. [Google Scholar] [CrossRef]
  6. Scott-Hayward, S.; Natarajan, S.; Sezer, S. A survey of security in software defined networks. IEEE Commun. Surv. Tutor. 2016, 18, 623–654. [Google Scholar] [CrossRef]
  7. Butun, I.; Morgera, S.D.; Sankar, R. A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 2014, 16, 266–282. [Google Scholar] [CrossRef]
  8. Langer, L.; Skopik, F.; Smith, P.; Kammerstetter, M. From old to new: Assessing cybersecurity risks for an evolving smart grid. Comput. Secur. 2016, 62, 165–176. [Google Scholar] [CrossRef]
  9. Zhang, Y.; Xiao, Y.; Ghaboosi, K.; Zhang, J.; Deng, H. A survey of cyber crimes. Secur. Commun. Netw. 2012, 5, 422–437. [Google Scholar] [CrossRef]
  10. Sharma, P.; Doshi, D.; Prajapati, M.M. Cybercrime: Internal security threat. In Proceedings of the IEEE International Conference on ICT in Business Industry & Government (ICTBIG), Indore, India, 18–19 November 2016; pp. 1–4. [Google Scholar]
  11. Yang, P. Study on cyber crime investigation and forensics based on internet traceability of computer firewall protocol. In Frontiers of Manufacturing Science & Measuring Technology V; C Book News: Portland, OR, USA, 2015; pp. 511–516. [Google Scholar]
  12. Gu, W.; Xu, L.; Ren, M.; Han, X. Network forensics scenario reconstruction method based on hidden Markov models. In Proceedings of the 2015 IEEE 7th International Conference on Information Technology in Medicine & Education (ITME), Huangshan, China, 13–15 November 2015; pp. 500–505. [Google Scholar]
  13. Li, Y.; Yan, J. Elf-based computer virus prevention technologies. In Information Computing & Applications, Pt II; National Natural Science Foundation of China (NSFC): Beijing, China, 2011; pp. 621–628. [Google Scholar]
  14. Zeng, L.; Xiao, Y.; Chen, H.; Sun, B.; Han, W. Computer operating system logging and security issues: A survey. Secur. Commun. Netw. 2016, 9, 4804–4821. [Google Scholar] [CrossRef]
  15. Kamarudin, M.H.; Maple, C.; Watson, T.; Safa, N.S. A logitboost-based algorithm for detecting known and unknown web attacks. IEEE Access 2017, 5, 26190–26200. [Google Scholar] [CrossRef]
  16. Liang, X.; Xiao, Y. Game theory for network security. IEEE Commun. Surv. Tutor. 2013, 15, 472–486. [Google Scholar] [CrossRef]
  17. Zheng, Z.; Sun, P. Application of RBF neural network in network security risk assessment. In Proceedings of the 2011 International Conference On Computational Science & Applications, Antwerp, Belgium, 26–27 March 2011; pp. 43–46. [Google Scholar]
  18. Kotenko, I.; Doynikova, E. Security assessment of computer networks based on attack graphs and security events. In Proceedings of the Information & Communication Technology-EurAsia Conference, Bali, Indonesia, 14–17 April 2014; pp. 462–471. [Google Scholar]
  19. Liang, L.; Yang, J.; Liu, G.; Zhu, G.; Yang, Y. Novel method of assessing network security risks based on vulnerability correlation graph. In Proceedings of the 2012 IEEE 2nd International Conference on Computer Science & Network Technology (ICCSNT), Changchun, China, 29–31 December 2012; pp. 1085–1090. [Google Scholar]
  20. Munir, R.; Disso, J.P.; Awan, I.; Mufti, M.R. A quantitative measure of the security risk level of enterprise networks. In Proceedings of the 2013 IEEE 8th International Conference on Broadband & Wireless Computing, Communication & Applications (BWCCA), Compiegne, France, 28–30 October 2013; pp. 437–442. [Google Scholar]
  21. Fei, J.; Xu, H. Assessing computer network security with fuzzy analytic hierarchy process. In Proceedings of the 2010 IEEE 2nd International Conference on Advanced Computer Control (ICACC), Shenyang, China, 27–29 March 2010; pp. 204–208. [Google Scholar]
  22. Li, C. Research on computer network security assessment based on fuzzy analytic hierarchy process. In Proceedings of the 2016 4th International Conference On Machinery, Materials & Computing Technology, Hangzhou, China, 23–24 January 2016; pp. 110–115. [Google Scholar]
  23. Dongmei, Q.; Chunshu, F. Study on network security assessment based on analytical hierarchy process. In Proceedings of the 2011 IEEE International Conference On Electronics, Communications & Control (ICECC), Ningbo, China, 9–11 September 2011; pp. 2320–2323. [Google Scholar]
  24. Feng, N.; Li, M. An information systems security risk assessment model under uncertain environment. Appl. Soft Comput. 2011, 11, 4332–4340. [Google Scholar] [CrossRef]
  25. Gao, H.; Zhu, J.; Li, C. The analysis of uncertainty of network security risk assessment using Dempster–Shafer theory. In Proceedings of the 2008 IEEE 12th International Conference On Computer Supported Cooperative Work In Design (CSCWD), Xi’an, China, 16–18 April 2008; pp. 754–759. [Google Scholar]
  26. Zedeh, L. Fuzzy sets. Information & Control 1965, 8, 338–353. [Google Scholar]
  27. Jiang, W.; Wei, B.; Liu, X.; Li, X.; Zheng, H. Intuitionistic fuzzy power aggregation operator based on entropy and its application in decision making. Int. J. Intell. Syst. 2018, 33, 49–67. [Google Scholar] [CrossRef]
  28. Jiang, W.; Wei, B. Intuitionistic fuzzy evidential power aggregation operator and its application in multiple criteria decision-making. Int. J. Syst. Sci. 2018, 49, 582–594. [Google Scholar] [CrossRef]
  29. Pawlak, Z. Rough sets. Int. J. Parallel Program. 1982, 11, 341–356. [Google Scholar] [CrossRef]
  30. Dubois, D.; Prade, H. Possibility Theory: An Approach to Computerized Processing of Uncertainty; Plenum Press: New York, NY, USA, 1988. [Google Scholar]
  31. Dempster, A.P. Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat. 1967, 38, 325–339. [Google Scholar] [CrossRef]
  32. Shafer, G. A Mathematical Theory of Evidence; Princeton University Press: Princeton, NJ, USA, 1976. [Google Scholar]
  33. Deng, Y. Generalized evidence theory. Appl. Intell. 2015, 43, 530–543. [Google Scholar] [CrossRef]
  34. Jiang, W.; Zhan, J. A modified combination rule in generalized evidence theory. Appl. Intell. 2017, 46, 630–640. [Google Scholar] [CrossRef]
  35. Deng, X.; Xiao, F.; Deng, Y. An improved distance-based total uncertainty measure in belief function theory. Appl. Intell. 2017, 46, 898–915. [Google Scholar] [CrossRef]
  36. Deng, Y.; Shi, W.; Zhu, Z.; Liu, Q. Combining belief functions based on distance of evidence. Decis. Support Syst. 2004, 38, 489–493. [Google Scholar]
  37. Jiang, W.; Chang, Y.; Wang, S. A method to identify the incomplete framework of discernment in evidence theory. Math. Prob. Eng. 2017, 2017, 7635972. [Google Scholar] [CrossRef]
  38. Deng, X.; Jiang, W. An evidential axiomatic design approach for decision making using the evaluation of belief structure satisfaction to uncertain target values. Int. J. Intell. Syst. 2018, 33, 15–32. [Google Scholar] [CrossRef]
  39. Deng, X.; Deng, Y. D-AHP method with different credibility of information. Soft Comput. 2018. [Google Scholar] [CrossRef]
  40. Jiang, W.; Xie, C.; Zhuang, M.; Tang, Y. Failure mode and effects analysis based on a novel fuzzy evidential method. Appl. Soft Comput. 2017, 57, 672–683. [Google Scholar] [CrossRef]
  41. Zheng, X.; Deng, Y. Dependence assessment in human reliability analysis based on evidence credibility decay model and IOWA operator. Ann. Nuclear Energy 2018, 112, 673–684. [Google Scholar] [CrossRef]
  42. Xu, H.; Deng, Y. Dependent evidence combination based on Shearman coefficient and Pearson coefficient. IEEE Access 2018. [Google Scholar] [CrossRef]
  43. Deng, X.; Han, D.; Dezert, J.; Deng, Y.; Shyr, Y. Evidence combination from an evolutionary game theory perspective. IEEE Trans. Cybern. 2016, 46, 2070–2082. [Google Scholar] [CrossRef] [PubMed]
  44. Yu, C.; Yang, J.; Yang, D.; Ma, X.; Min, H. An improved conflicting evidence combination approach based on a new supporting probability distance. Expert Syst. Appl. 2015, 42, 5139–5149. [Google Scholar] [CrossRef]
  45. Murphy, C.K. Combining belief functions when evidence conflicts. Decis. Support Syst. 2000, 29, 1–9. [Google Scholar] [CrossRef]
  46. Deng, Y. Deng entropy. Chaos Solitons Fractals 2016, 91, 549–553. [Google Scholar] [CrossRef]
  47. Harmanec, D.; Klir, G.J. Measuring total uncertainty in Dempster–Shafer theory: A novel approach. Int. J. Gen. Syst. 1994, 22, 405–419. [Google Scholar] [CrossRef]
  48. Jousselme, A.L.; Liu, C.; Grenier, D.; Bossé, É. Measuring ambiguity in the evidence theory. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 2006, 36, 890–903. [Google Scholar] [CrossRef]
  49. Jiang, W.; Wang, S. An uncertainty measure for interval-valued evidences. Int. J. Comput. Commun. Control 2017, 12, 631–644. [Google Scholar] [CrossRef]
  50. Wang, X.; Song, Y. Uncertainty measure in evidence theory with its applications. Appl. Intell. 2017. [Google Scholar] [CrossRef]
  51. Yang, Y.; Han, D. A new distance-based total uncertainty measure in the theory of belief functions. Knowl. Based Syst. 2016, 94, 114–123. [Google Scholar] [CrossRef]
  52. Smets, P.; Kennes, R. The transferable belief model. Artif. Intell. 1994, 66, 191–234. [Google Scholar] [CrossRef]
  53. Zhang, S. A model for evaluating computer network security systems with 2-tuple linguistic information. Comput. Math. Appl. 2011, 62, 1916–1922. [Google Scholar] [CrossRef]
Figure 1. The hierarchical structure model [25].
Figure 1. The hierarchical structure model [25].
Applsci 08 00428 g001
Figure 2. Development of the proposed method.
Figure 2. Development of the proposed method.
Applsci 08 00428 g002
Figure 3. Comparison of evaluation results of different methods.
Figure 3. Comparison of evaluation results of different methods.
Applsci 08 00428 g003
Figure 4. Comparison of evaluation results before and after changing m 15 .
Figure 4. Comparison of evaluation results before and after changing m 15 .
Applsci 08 00428 g004
Figure 5. Comparison of evaluation results before and after changing evidence m 22 .
Figure 5. Comparison of evaluation results before and after changing evidence m 22 .
Applsci 08 00428 g005
Figure 6. The geometric representation of linguistic variables in Table 18 including extremely poor (EP), very poor (VP), poor (P), medium (M), good (G), very good (VG), extremely good (EG).
Figure 6. The geometric representation of linguistic variables in Table 18 including extremely poor (EP), very poor (VP), poor (P), medium (M), good (G), very good (VG), extremely good (EG).
Applsci 08 00428 g006
Figure 7. The ranking of the network security system.
Figure 7. The ranking of the network security system.
Applsci 08 00428 g007
Table 1. Criteria of the bottom level [25].
Table 1. Criteria of the bottom level [25].
CriteriaDescription of the Criteria
a 11 Prevention of Malice Software
a 12 Media Processing and Security
a 13 Operation Program and Duty
a 14 Network Management
a 15 Information and Software, Hardware Exchange
a 21 Management of Network Access
a 22 Management of User’s Access
a 23 Management of Application Access
a 24 System Access and Monitoring of Usage
a 31 Effect on Tangible Assets
a 32 Effect on Intangible Assets
Table 2. The basic probability assignments (BPAs) of bottom criteria [25]: very low (VL), low (L), middle low (ML), middle (M), middle high (MH), high (H), very high (VH).
Table 2. The basic probability assignments (BPAs) of bottom criteria [25]: very low (VL), low (L), middle low (ML), middle (M), middle high (MH), high (H), very high (VH).
Bottom CriteriaBPA
VLLMLMMHHVH Θ
a 11 00.10.10.20.20.30.10
a 12 00.10.10.20.20.20.10.1
a 13 00.10.150.20.30.1500.1
a 14 00.10.10.150.20.30.10.05
a 15 0.10.10.10.20.30.100.1
a 21 000.10.10.20.20.30.1
a 22 0.10.10.150.20.20.10.10.05
a 23 0.10.10.10.10.20.20.10.1
a 24 00.10.10.20.30.20.10
a 31 00.10.10.10.30.20.10.1
a 32 000.10.10.20.20.30.1
Table 3. Subjective weights of criteria.
Table 3. Subjective weights of criteria.
Middle Level CriteriaSubjective WeightsBottom CriteriaSubjective Weights
a 1 0.310 a 11 0.157
a 12 0.393
a 13 0.164
a 14 0.172
a 15 0.114
a 2 0.580 a 21 0.281
a 22 0.312
a 23 0.280
a 24 0.127
a 3 0.110 a 31 0.670
a 32 0.330
Table 4. Objective weights of bottom criteria.
Table 4. Objective weights of bottom criteria.
Bottom CriteriaUncertainty ValuesObjective Weights
a 11 0.12470.2847
a 12 0.21390.1660
a 13 0.20930.1697
a 14 0.16810.2112
a 15 0.21090.1684
a 21 0.20870.2063
a 22 0.17290.2491
a 23 0.21610.1993
a 24 0.12470.3453
a 31 0.21090.4974
a 32 0.20870.5026
Table 5. Comprehensive weights of bottom criteria.
Table 5. Comprehensive weights of bottom criteria.
Bottom CriteriaSubjective WeightsObjective WeightsComprehensive Weights
a 11 0.15700.28470.2312
a 12 0.39300.16600.3375
a 13 0.16400.16970.1440
a 14 0.17200.21120.1879
a 15 0.11400.16840.0993
a 21 0.28100.20630.2463
a 22 0.31200.24910.3302
a 23 0.28000.19930.2371
a 24 0.12700.34530.1863
a 31 0.67000.49740.6677
a 32 0.33000.50260.3323
Table 6. The weighted average of evidence of bottom criteria.
Table 6. The weighted average of evidence of bottom criteria.
VLLMLMMHHVH Θ
m 1 ¯ 0.00990.10000.10720.19060.22430.22480.07570.0675
m 2 ¯ 0.05670.07540.11650.15170.21860.16700.14930.0649
m 3 ¯ 00.06680.10000.10000.26680.20000.16650.1000
Table 7. The BPAs of bottom criteria after combination.
Table 7. The BPAs of bottom criteria after combination.
VLLMLMMHHVH Θ
m 1 0.00020.02270.02810.19910.36820.37130.01020.0002
m 2 0.01320.02420.06990.14310.42300.18850.13690.0012
m 3 00.05040.08490.08490.35240.22640.17270.0283
Table 8. Objective and comprehensive weights of middle level criteria.
Table 8. Objective and comprehensive weights of middle level criteria.
Middle Level CriteriaSubjective WeightsObjective WeightsComprehensive Weights
a 1 0.310.36920.3291
a 2 0.580.34870.5816
a 3 0.110.28210.0892
Table 9. The weighted average evidence and combination result of middle level criteria.
Table 9. The weighted average evidence and combination result of middle level criteria.
VLLMLMMHHVH Θ
m ¯ 0.00770.02610.05750.15640.39860.25210.09840.0033
m00.00030.00260.04680.74680.19150.01210
Table 10. The probability distribution of the evaluation result.
Table 10. The probability distribution of the evaluation result.
VLLMLMMHHVH
B e t P 00.00030.00260.04680.74680.19150.0121
Table 11. The BPAs of bottom criteria after combination in [25].
Table 11. The BPAs of bottom criteria after combination in [25].
VLLMLMMHHVH Θ
m 1 0.00230.08860.09320.20820.24390.23210.07430.0575
m 2 0.04740.05160.11510.15770.30330.16560.14520.014
m 3 00.08250.09710.09710.30580.20880.12630.0825
Table 12. BPAs of the attributes of A 1 .
Table 12. BPAs of the attributes of A 1 .
AttributesBPA
G 1 m ( s 1 ) = 0.2976 , m ( s 3 ) = 0.2998 , m ( s 5 ) = 0.2935 , m ( { s 1 , s 3 , s 5 } ) = 0.1091
G 2 m ( s 4 ) = 0.2998 , m ( s 5 ) = 0.2976 , m ( s 6 ) = 0.2935 , m ( { s 4 , s 5 , s 6 } ) = 0.1091
G 3 m ( s 2 ) = 0.2998 , m ( s 3 ) = 0.2935 , m ( s 5 ) = 0.2976 , m ( { s 2 , s 3 , s 6 } ) = 0.1091
G 4 m ( s 4 ) = 0.2935 , m ( s 5 ) = 0.2976 , m ( s 6 ) = 0.2998 , m ( { s 4 , s 5 , s 6 } ) = 0.1091
G 5 m ( s 2 ) = 0.2998 , m ( s 4 ) = 0.2976 , m ( s 6 ) = 0.2935 , m ( { s 2 , s 4 , s 6 } ) = 0.1091
Table 13. BPAs of the attributes of A 2 .
Table 13. BPAs of the attributes of A 2 .
AttributesBPA
G 1 m ( s 2 ) = 0.2976 , m ( s 3 ) = 0.2935 , m ( s 6 ) = 0.2998 , m ( { s 2 , s 3 , s 6 } ) = 0.1091
G 2 m ( s 1 ) = 0.2935 , m ( s 4 ) = 0.2976 , m ( s 6 ) = 0.2998 , m ( { s 1 , s 4 , s 6 } ) = 0.1091
G 3 m ( s 1 ) = 0.2976 , m ( s 2 ) = 0.2935 , m ( s 5 ) = 0.2998 , m ( { s 1 , s 2 , s 5 } ) = 0.1091
G 4 m ( s 1 ) = 0.2935 , m ( s 3 ) = 0.2998 , m ( s 4 ) = 0.2976 , m ( { s 1 , s 3 , s 4 } ) = 0.1091
G 5 m ( s 0 ) = 0.2935 , m ( s 1 ) = 0.2998 , m ( s 3 ) = 0.2976 , m ( { s 0 , s 1 , s 3 } ) = 0.1091
Table 14. BPAs of the attributes of A 3 .
Table 14. BPAs of the attributes of A 3 .
AttributesBPA
G 1 m ( s 2 ) = 0.3119 , m ( s 4 ) = 0.6150 , m ( { s 2 , s 4 } ) = 0.0732
G 2   m ( s 0 ) = 0.2935 , m ( s 2 ) = 0.2976 , m ( s 3 ) = 0.2998 , m ( { s 0 , s 2 , s 3 } ) = 0.1091
G 3 m ( s 5 ) = 0.3098 , m ( s 6 ) = 0.6174 , m ( { s 5 , s 6 } ) = 0.0729
G 4 m ( s 1 ) = 0.6222 , m ( s 3 ) = 0.3056 , m ( { s 1 , s 3 } ) = 0.0722
G 5   m ( s 2 ) = 0.2935 , m ( s 3 ) = 0.2998 , m ( s 6 ) = 0.2976 , m ( { s 2 , s 3 , s 6 } ) = 0.1091
Table 15. BPAs of the attributes of A 4 .
Table 15. BPAs of the attributes of A 4 .
AttributesBPA
G 1 m ( s 1 ) = 0.6174 , m ( s 6 ) = 0.3098 , m ( { s 1 , s 6 } ) = 0.0729
G 2   m ( s 0 ) = 0.2998 , m ( s 1 ) = 0.2976 , m ( s 5 ) = 0.2935 , m ( { s 0 , s 1 , s 5 } ) = 0.1091
G 3   m ( s 0 ) = 0.2976 , m ( s 3 ) = 0.2935 , m ( s 4 ) = 0.2998 , m ( { s 0 , s 3 , s 4 } ) = 0.1091
G 4   m ( s 2 ) = 0.2935 , m ( s 4 ) = 0.2998 , m ( s 6 ) = 0.2976 , m ( { s 2 , s 4 , s 6 } ) = 0.1091
G 5   m ( s 2 ) = 0.2976 , m ( s 3 ) = 0.2935 , m ( s 6 ) = 0.2976 , m ( { s 2 , s 3 , s 6 } ) = 0.1091
Table 16. The comprehensive weights of the attributes of A i .
Table 16. The comprehensive weights of the attributes of A i .
Network Security SystemComprehensive Weights of Attributes
A 1 ω 1 = { 0.1000 , 0.1500 , 0.2000 , 0.3000 , 0.2500 }
A 2 ω 2 = { 0.1000 , 0.1500 , 0.2000 , 0.3000 , 0.2500 }
A 3 ω 3 = { 0.1175 , 0.1086 , 0.2360 , 0.3568 , 0.1810 }
A 4 ω 4 = { 0.1533 , 0.1411 , 0.1882 , 0.2822 , 0.2352 }
Table 17. The evaluation results (expressed by BPA).
Table 17. The evaluation results (expressed by BPA).
Network Security SystemThe Evaluation Results (Expressed by BPA)
A 1 m ( s 0 ) = 0.0000 , m ( s 1 ) = 0.0000 , m ( s 2 ) = 0.0237 , m ( s 3 ) = 0.0030 ,
m ( s 4 ) = 0.2071 , m ( s 5 ) = 0.0625 , m ( s 6 ) = 0.7306
A 2 m ( s 0 ) = 0.0013 , m ( s 1 ) = 0.8305 , m ( s 2 ) = 0.0034 , m ( s 3 ) = 0.1669 ,
m ( s 4 ) = 0.0264 , m ( s 5 ) = 0.0000 , m ( s 6 ) = 0.0014
A 3 m ( s 0 ) = 0.0000 , m ( s 1 ) = 0.3294 , m ( s 2 ) = 0.0396 , m ( s 3 ) = 0.3668 ,
m ( s 4 ) = 0.0012 , m ( s 5 ) = 0.0021 , m ( s 6 ) = 0.2608
A 4 m ( s 0 ) = 0.0182 , m ( s 1 ) = 0.0483 , m ( s 2 ) = 0.1675 , m ( s 3 ) = 0.0602 ,
m ( s 4 ) = 0.1098 , m ( s 5 ) = 0.0000 , m ( s 6 ) = 0.5956
Table 18. Linguistic variables for the evaluation.
Table 18. Linguistic variables for the evaluation.
Linguistic VariableFuzzy Numbers
s 0 (EP)(0,0,1,2)
s 1 (VP)(1,2,2,3)
s 2 (P)(2,3,4,5)
s 3 (M)(4,5,5,6)
s 4 (G)(5,6,7,8)
s 5 (VG)(7,8,8,9)
s 6 (GP)(8,9,10,10)
Table 19. The evaluation results by using the assessment approach in [25].
Table 19. The evaluation results by using the assessment approach in [25].
Network Security SystemThe Total ScoreBPA
A 1 7.9622 m ( s 4 ) = 0.2930 , m ( s 5 ) = 0.1082 , m ( s 6 ) = 0.5630 ,
m ( { s 4 , s 6 } ) = 0.0126 , m ( { s 4 , s 5 , s 6 } ) = 0.0231
A 2 3.1515 m ( s 1 ) = 0.6006 , m ( s 3 ) = 0.2702 , m ( s 4 ) = 0.0922 ,
m ( { s 1 , s 3 } ) = 0.0.0122 , m ( { s 1 , s 4 } ) = 0.0024 ,
m ( { s 1 , s 3 , s 5 } ) = 0.0223
A 3 4.0068 m ( s 1 ) = 0.2774 , m ( s 3 ) = 0.6904 ,
m ( { s 1 , s 3 } ) = 0.0322
A 4 6.2797 m ( s 2 ) = 0.3329 , m ( s 4 ) = 0.2006 , m ( s 6 ) = 0.4132 ,
m ( { s 2 , s 6 } ) = 0.0188 , m ( { s 2 , s 4 , s 6 } ) = 0.0345
Table 20. The ranking of the network security system.
Table 20. The ranking of the network security system.
Weight ( G 1 , G 5 )Scores ( A 1 , A 2 , A 3 , A 4 )Ranking
(0.10,0.25)(8.6818,2.6929,5.0611,7.2044) A 1 > A 4 > A 3 > A 2
(0.15,0.20)(8.1930,2.7884,3.8953,5.8952) A 1 > A 4 > A 3 > A 2
(0.20,0.15)(8.4226,3.0275,3.9050,6.1114) A 1 > A 4 > A 3 > A 2
(0.25,0.10)(7.9419,3.5380,3.0057,5.2914) A 1 > A 4 > A 2 > A 3
(0.30,0.05)(8.4870,4.0109,4.5264,4.2198) A 1 > A 3 > A 4 > A 2

Share and Cite

MDPI and ACS Style

Duan, Y.; Cai, Y.; Wang, Z.; Deng, X. A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty. Appl. Sci. 2018, 8, 428. https://doi.org/10.3390/app8030428

AMA Style

Duan Y, Cai Y, Wang Z, Deng X. A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty. Applied Sciences. 2018; 8(3):428. https://doi.org/10.3390/app8030428

Chicago/Turabian Style

Duan, Yancui, Yonghua Cai, Zhikang Wang, and Xinyang Deng. 2018. "A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty" Applied Sciences 8, no. 3: 428. https://doi.org/10.3390/app8030428

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop