Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method

被引:8
|
作者
Xu, Wenshu [1 ]
Lin, Mingwei [1 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 77卷 / 01期
关键词
Multi-criteria decision-making; distance measure; probabilistic linguistic term sets; industrial control system; information security assessment; RISK-ASSESSMENT; ENTROPY; SETS;
D O I
10.32604/cmc.2023.041475
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial control systems (ICSs) are widely used in various fields, and the information security problems of ICSs are increasingly serious. The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts. Thus, this paper introduces the probabilistic linguistic term sets (PLTSs) to model the evaluation information of experts. Meanwhile, we propose a probabilistic linguistic multi-criteria decision-making (PL-MCDM) method to solve the information security assessment problem of ICSs. Firstly, we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods. Secondly, we use the Best Worst Method (BWM) method and Criteria Importance Through Inter-criteria Correlation (CRITIC) method to obtain the subjective weights and objective weights, which are used to derive the combined weights. Thirdly, we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje (PL-VIKOR) method. Finally, we apply the proposed method to solve the information security assessment problem of ICSs. When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisao Iterativa Multicriterio (PL-TODIM) method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution (PL-TOPSIS) method, the case example shows that the proposed method can provide more reasonable ranking results. By evaluating and ranking the information security level of different ICSs, managers can identify problems in time and guide their work better.
引用
收藏
页码:199 / 222
页数:24
相关论文
共 50 条
  • [41] Evaluation of human resource information systems using grey ordinal pairwise comparison MCDM methods
    Esangbedo, Moses Olabhele
    Bai, Sijun
    Mirjalili, Seyedali
    Wang, Zonghan
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 182 (182)
  • [42] Tracing security requirements in industrial control systems using graph databases
    Tanveer, Awais
    Sharma, Chandan
    Sinha, Roopak
    Kuo, Matthew M. Y.
    SOFTWARE AND SYSTEMS MODELING, 2023, 22 (03): : 851 - 870
  • [43] Tracing security requirements in industrial control systems using graph databases
    Awais Tanveer
    Chandan Sharma
    Roopak Sinha
    Matthew M. Y. Kuo
    Software and Systems Modeling, 2023, 22 : 851 - 870
  • [44] Security Verification of Industrial Control Systems using Partial Model Checking
    Kulik, Tomas
    Boudjadar, Jalil
    Tran-Jorgensen, Peter W. V.
    2020 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON FORMAL METHODS IN SOFTWARE ENGINEERING, FORMALISE, 2020, : 98 - 108
  • [45] Probabilistic Linguistic TODIM Method with Probabilistic Linguistic Entropy Weight and Hamming Distance for Teaching Reform Plan Evaluation
    Wu, Wenshuai
    MATHEMATICS, 2024, 12 (22)
  • [46] Comprehensive evaluation model for computer network security with linguistic information
    Li Y.
    Shan X.
    Wu G.
    Advances in Information Sciences and Service Sciences, 2011, 3 (09): : 126 - 131
  • [47] Modeling of information systems to their security evaluation
    Zegzhda, D.
    Zegzhda, P.
    Pechenkin, A.
    Poltavtseva, M.
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 295 - 298
  • [48] Supplier Evaluation Considering Green Production Based on Probabilistic Linguistic Information
    Yuan, Shuailei
    Liu, Aijun
    Li, Zengxian
    Yang, Yun
    Liu, Jing
    Su, Yue
    ENERGIES, 2022, 15 (19)
  • [49] Information Flow for Security in Control Systems
    Weerakkody, Sean
    Sinopoli, Bruno
    Kar, Soummya
    Datta, Anupam
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 5065 - 5072
  • [50] A Novel Decision-Making Method Based on Probabilistic Linguistic Information
    Peide Liu
    Ying Li
    Cognitive Computation, 2019, 11 : 735 - 747