Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set

被引:0
|
作者
Cai, Wentian [1 ]
Yao, Huijun [2 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Jiangsu Broadcasting Cable Informat Network Corp, Nanjing 210096, Peoples R China
关键词
D O I
10.1155/2021/9663520
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing complexity of the network structure and the increasing size of the network, various network security incidents pose an increasing threat to the security of computer systems and the network. Especially, in the network environment, the diversified intrusion methods and application environment make the security of the network more fragile. In order to improve information security, based on fuzzy rule sets, this paper proposes a fuzzy association rule mining algorithm based on fuzzy matrix and applies it to security event correlation. In addition, this paper combines the embedded system to construct an information security risk assessment system and sets the system performance based on the actual situation. Finally, this paper carries out experimental design to verify the performance of the system and analyzes the experimental results by mathematical statistics. From the experimental research, it can be seen that the system constructed in this paper has a certain effect.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    [J]. MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
  • [2] Risk Assessment of Enterprises Information Security Based on Fuzzy Set and Entropy Weight
    Wang, Yi
    Yuan, Jia-hang
    Zhang, Jian-ye
    Li, Cun-bin
    [J]. 4TH INTERNATIONAL CONFERENCE ON ECONOMICS AND MANAGEMENT (ICEM), 2017, : 337 - 342
  • [3] The Research of Information Security Risk Assessment Method Based on AHP
    Xu, Ning
    Zhao, DongMei
    [J]. SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 575 - 580
  • [4] Method of Information Security Risk Assessment Based on Improved Fuzzy Theory of Evidence
    Huang Xuepeng
    Xu Wei
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (03) : 188 - 196
  • [5] Assessment Model and Method Research of Information Security Risk
    Lu Zhen
    Xiong Zhen
    Tu Keqin
    [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2170 - +
  • [6] The Information Security Risk Assessment Based on Fuzzy Comprehensive Evaluation
    Li Guohong
    Cai Yongkai
    [J]. PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS A-C, 2008, : 2027 - 2031
  • [7] Risk Assessment for Information Security Based on Fuzzy Membership Matrix
    Bai, Yan
    Yao, Zhong
    Li, Hong
    Zhang, Yong-Qiang
    [J]. NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 547 - +
  • [8] Network Security Risk Assessment Method Research Based on Fuzzy Analytic Hierarchy Process
    Yu, Zhi
    Xu, Xiang
    Wu, Xianjie
    [J]. NANOTECHNOLOGY AND COMPUTER ENGINEERING, 2010, 121-122 : 80 - 86
  • [9] A Method of Information Security Risk Assessment Using Fuzzy Number Operations
    Fu, Yu
    Qin, Yanlin
    Wu, Xiaoping
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12564 - 12567
  • [10] A Method For Information Security Risk Aassessment Based On Fuzzy Operator
    Ye, ShiChao
    Wu, KeHe
    Niu, YuGuang
    [J]. ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 454 - +