Decision Making Approaches for Security Vulnerability Management

博士 === 國立臺灣大學 === 資訊管理學研究所 === 102 === The aim of this study is to formulate an analysis model that can express security vulnerability grades and serve as a basis for the evaluation of information program danger levels or for filtering hazardous system vulnerabilities, and to improve it to counter v...

Full description

Bibliographic Details
Main Authors: Chien-Cheng Huang, 黃健誠
Other Authors: 林永松
Format: Others
Language:en_US
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/74661141854042517311
id ndltd-TW-102NTU05396009
record_format oai_dc
spelling ndltd-TW-102NTU053960092016-03-09T04:24:03Z http://ndltd.ncl.edu.tw/handle/74661141854042517311 Decision Making Approaches for Security Vulnerability Management 資訊安全弱點管理之決策方法 Chien-Cheng Huang 黃健誠 博士 國立臺灣大學 資訊管理學研究所 102 The aim of this study is to formulate an analysis model that can express security vulnerability grades and serve as a basis for the evaluation of information program danger levels or for filtering hazardous system vulnerabilities, and to improve it to counter various security threats. Using a fuzzy analytic hierarchy process, this paper organizes crossover factors of system blind spots, and builds an evaluation framework. First, via the fuzzy Delphi method, aspects and relative determinants affecting security are screened. It then identifies the value equation of each factor, and settles the fuzzy synthetic vulnerability decision-making model. This model can analyze the various degrees to which vulnerabilities affect system security, and this information will serve as a basis for future ameliorations of the system itself. This study also proposes an improvement from the traditional fuzzy synthetic decision-making model for measuring the fuzziness between the enhancement and independence of various aspects and criteria. Furthermore, taking human subjectivity into consideration, this paper constructs a fuzzy integral decision-making model. The case study demonstrates that the evaluation model in question is practical and can be applied to new vulnerabilities to measure their degree of penetration. In addition, the fuzzy integral decision-making model emphasizes the multiply-add effect between various factors influencing information security. On the other hand, based on the above results’ weight and security level, with limited defense resources, this research proposes defense resource allocation strategies for security vulnerability management in order to maximize security utility and improve defense capability. As the problem is a mathematical optimization problem of nonlinear programming, this study finds the near optimal defense resource allocations for analysis and discussion through the problem-solving process. 林永松 2014 學位論文 ; thesis 100 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 博士 === 國立臺灣大學 === 資訊管理學研究所 === 102 === The aim of this study is to formulate an analysis model that can express security vulnerability grades and serve as a basis for the evaluation of information program danger levels or for filtering hazardous system vulnerabilities, and to improve it to counter various security threats. Using a fuzzy analytic hierarchy process, this paper organizes crossover factors of system blind spots, and builds an evaluation framework. First, via the fuzzy Delphi method, aspects and relative determinants affecting security are screened. It then identifies the value equation of each factor, and settles the fuzzy synthetic vulnerability decision-making model. This model can analyze the various degrees to which vulnerabilities affect system security, and this information will serve as a basis for future ameliorations of the system itself. This study also proposes an improvement from the traditional fuzzy synthetic decision-making model for measuring the fuzziness between the enhancement and independence of various aspects and criteria. Furthermore, taking human subjectivity into consideration, this paper constructs a fuzzy integral decision-making model. The case study demonstrates that the evaluation model in question is practical and can be applied to new vulnerabilities to measure their degree of penetration. In addition, the fuzzy integral decision-making model emphasizes the multiply-add effect between various factors influencing information security. On the other hand, based on the above results’ weight and security level, with limited defense resources, this research proposes defense resource allocation strategies for security vulnerability management in order to maximize security utility and improve defense capability. As the problem is a mathematical optimization problem of nonlinear programming, this study finds the near optimal defense resource allocations for analysis and discussion through the problem-solving process.
author2 林永松
author_facet 林永松
Chien-Cheng Huang
黃健誠
author Chien-Cheng Huang
黃健誠
spellingShingle Chien-Cheng Huang
黃健誠
Decision Making Approaches for Security Vulnerability Management
author_sort Chien-Cheng Huang
title Decision Making Approaches for Security Vulnerability Management
title_short Decision Making Approaches for Security Vulnerability Management
title_full Decision Making Approaches for Security Vulnerability Management
title_fullStr Decision Making Approaches for Security Vulnerability Management
title_full_unstemmed Decision Making Approaches for Security Vulnerability Management
title_sort decision making approaches for security vulnerability management
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/74661141854042517311
work_keys_str_mv AT chienchenghuang decisionmakingapproachesforsecurityvulnerabilitymanagement
AT huángjiànchéng decisionmakingapproachesforsecurityvulnerabilitymanagement
AT chienchenghuang zīxùnānquánruòdiǎnguǎnlǐzhījuécèfāngfǎ
AT huángjiànchéng zīxùnānquánruòdiǎnguǎnlǐzhījuécèfāngfǎ
_version_ 1718200293893603328