首页> 外文OA文献 >Modelling cyber-security experts' decision making processes using aggregation operators
【2h】

Modelling cyber-security experts' decision making processes using aggregation operators

机译:使用聚合运算符为网络安全专家的决策流程建模

摘要

An important role carried out by cyber-security experts is the assessment of proposed computer systems, during their design stage. This task is fraught with difficulties and uncertainty, making the knowledge provided by human experts essential for successful assessment. Today, the increasing number of progressively complex systems has led to an urgent need to produce tools that support the expert-led process of system-security assessment. In this research, we use Weighted Averages (WAs) and Ordered Weighted Averages (OWAs) with Evolutionary Algorithms (EAs) to create aggregation operators that model parts of the assessment process. We show how individual overall ratings for security components can be produced from ratings of their characteristics, and how these individual overall ratings can be aggregated to produce overall rankings of potential attacks on a system. As well as the identification of salient attacks and weak points in a prospective system, the proposed method also highlights which factors and security components contribute most to a component's difficulty and attack ranking respectively. A real world scenario is used in which experts were asked to rank a set of technical attacks, and to answer a series of questions about the security components that are the subject of the attacks. The work shows how finding good aggregation operators, and identifying important components and factors of a cyber-security problem can be automated. The resulting operators have the potential for use as decision aids for systems designers and cyber-security experts, increasing the amount of assessment that can be achieved with the limited resources available.
机译:网络安全专家扮演的重要角色是在设计阶段对提议的计算机系统进行评估。这项任务充满困难和不确定性,使得人类专家提供的知识对于成功评估至关重要。如今,越来越复杂的系统越来越多,因此迫切需要提供支持专家指导的系统安全评估过程的工具。在这项研究中,我们使用加权平均数(WA)和有序加权平均数(OWA)以及进化算法(EA)来创建对评估过程的各个部分进行建模的聚合算子。我们展示如何从安全组件的特征等级中得出安全组件的总体等级,以及如何将这些总体等级进行汇总以得出系统潜在攻击的总体等级。除了识别潜在系统中的突出攻击和薄弱环节外,该方法还突出显示了哪些因素和安全组件分别对组件的难度和攻击等级贡献最大。使用了一个真实的场景,其中要求专家对一组技术攻击进行排名,并回答有关作为攻击对象的安全组件的一系列问题。这项工作展示了如何自动找到优秀的聚合运营商,以及识别网络安全问题的重要组成部分和因素。由此产生的运营商有潜力用作系统设计人员和网络安全专家的决策辅助,从而增加了可用有限资源可以实现的评估数量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号