Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set

被引:0
|
作者
Cai, Wentian [1 ]
Yao, Huijun [2 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Jiangsu Broadcasting Cable Informat Network Corp, Nanjing 210096, Peoples R China
关键词
D O I
10.1155/2021/9663520
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing complexity of the network structure and the increasing size of the network, various network security incidents pose an increasing threat to the security of computer systems and the network. Especially, in the network environment, the diversified intrusion methods and application environment make the security of the network more fragile. In order to improve information security, based on fuzzy rule sets, this paper proposes a fuzzy association rule mining algorithm based on fuzzy matrix and applies it to security event correlation. In addition, this paper combines the embedded system to construct an information security risk assessment system and sets the system performance based on the actual situation. Finally, this paper carries out experimental design to verify the performance of the system and analyzes the experimental results by mathematical statistics. From the experimental research, it can be seen that the system constructed in this paper has a certain effect.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Security Risk Assessment Method Using Fuzzy Logic
    Ismagilov, Ilyas I.
    Molotov, Linar A.
    Gilmullin, Timur M.
    Anikin, Igor, V
    Katasev, Alexey S.
    [J]. HELIX, 2018, 8 (06): : 4674 - 4682
  • [32] A NEW LIGHTWEIGHT METHOD FOR SECURITY RISK ASSESSMENT BASED ON FUZZY COGNITIVE MAPS
    Szwed, Piotr
    Skrzynski, Pawel
    [J]. INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2014, 24 (01) : 213 - 225
  • [33] A New Security Risk Assessment Method of Website Based on Generalized Fuzzy Numbers
    Jiang, Wen
    Fan, Xin
    Duanmu, Dejie
    Deng, Yong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (01) : 136 - 145
  • [34] Assessment of risk of information security by means of the theory of fuzzy sets
    Murathin, R.
    Satybaldina, D. Z.
    [J]. BULLETIN OF THE KARAGANDA UNIVERSITY-MATHEMATICS, 2015, 79 (03): : 66 - 74
  • [35] Apply Fuzzy Decision Tree to Information Security Risk Assessment
    Lee, Zne-Jung
    Chang, Li-Yun
    [J]. INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2014, 16 (02) : 265 - 269
  • [36] Application of Fuzzy Logic in the Process of Information Security Risk Assessment
    Kokles, Mojmir
    Filanova, Jana
    Korcek, Frantisek
    [J]. INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 1078 - 1088
  • [37] Information systems security risk assessment on improved fuzzy AHP
    Wu, Xiaoping
    Fu, Yu
    Wang, Jiasheng
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 365 - 369
  • [38] An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process
    Liu Dong-liang
    Yang Shi-song
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 874 - 877
  • [39] A Software Defined Network information security risk assessment based on Pythagorean fuzzy sets
    Deb, Raktim
    Roy, Sudipta
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 183
  • [40] Risk Assessment of Information System Security Based on Fuzzy Multiple Criteria Group AHP
    Sun, Shengchun
    Pu, Huaiyu
    Tian, Shuxin
    [J]. ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 1, 2012, 159 : 385 - +