Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set

被引:0
|
作者
Cai, Wentian [1 ]
Yao, Huijun [2 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Jiangsu Broadcasting Cable Informat Network Corp, Nanjing 210096, Peoples R China
关键词
D O I
10.1155/2021/9663520
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing complexity of the network structure and the increasing size of the network, various network security incidents pose an increasing threat to the security of computer systems and the network. Especially, in the network environment, the diversified intrusion methods and application environment make the security of the network more fragile. In order to improve information security, based on fuzzy rule sets, this paper proposes a fuzzy association rule mining algorithm based on fuzzy matrix and applies it to security event correlation. In addition, this paper combines the embedded system to construct an information security risk assessment system and sets the system performance based on the actual situation. Finally, this paper carries out experimental design to verify the performance of the system and analyzes the experimental results by mathematical statistics. From the experimental research, it can be seen that the system constructed in this paper has a certain effect.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Research on the University Network Information Security Risk Management Model Based on the Fuzzy Sets
    Huo, Cai-qiao
    Meng, Li-zhuang
    Chen, Kai
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 89 - 93
  • [42] Research on Network Security Risk Assessment Method Based on Bayesian Reasoning
    Li, Xiangna
    Li, Mengao
    Wang, Hui
    [J]. PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 102 - 108
  • [43] Research on the Lightning Risk Assessment Method for Chongqing Based on Fuzzy Mathematics
    Yu Shuyu
    Ren Yan
    [J]. 2014 INTERNATIONAL CONFERENCE ON LIGHTNING PROTECTION (ICLP), 2014, : 1054 - 1057
  • [44] Application of fuzzy set theory to evaluate the rate of aggregative risk in information security
    Tamjidyamcholo, Alireza
    Bin, Mohd Sapiyan
    Yamchello, Hamed Tamjid
    Gholipour, Rahmatollah
    [J]. 2013 INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS), 2013, : 410 - 415
  • [45] Network Information Security Risk Assessment Method Based on Machine Learning Algorithm
    Jiang, Ruirong
    Wan, Liyong
    [J]. ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2022, PT II, 2023, 469 : 403 - 416
  • [46] An information Security Risk Assessment Method Based on Conduct Effect and Dynamic Threat
    Qiao Hong
    Tian Jianwei
    Tian Zheng
    Qi Wenhui
    Li Xi
    Zhu Hongyu
    Chen Shengsheng
    [J]. PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 782 - 786
  • [47] Research on fuzzy group decision making in security risk assessment
    Liu, F
    Dai, K
    Wang, ZY
    Ma, J
    [J]. NETWORKING - ICN 2005, PT 2, 2005, 3421 : 1114 - 1121
  • [48] An Improved Risk Assessment Method for SCADA Information Security
    Markovic-Petrovic, J. D.
    Stojanovic, M. D.
    [J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 69 - 72
  • [49] Information security risk assessment using the AHP method
    Zaburko, J.
    Szulzyk-Cieplak, J.
    [J]. IV INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN ENGINEERING SCIENCE (CMES'19), 2019, 710
  • [50] Decision rule extraction method based on rough set theory and fuzzy set theory
    Wang, MC
    Wang, ZO
    Zhang, M
    Yan, P
    [J]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2212 - 2216