Apply Fuzzy Decision Tree to Information Security Risk Assessment

被引:0
|
作者
Lee, Zne-Jung [1 ]
Chang, Li-Yun [2 ]
机构
[1] Huafan Univ, Dept Informat Management, New Taipei City 22301, Taiwan
[2] Hua Fan Univ, Dept Mechatron Engn, New Taipei City 22301, Taiwan
关键词
Information Security; Risk Assessment; Fuzzy Decision Tree; ISO; 27001; ISO 27005:2008;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As computer becomes popular and internet advances rapidly, information application systems are used extensively in organizations. Various information application systems such as attendance systems, accounting systems, and statistical systems have already replaced manual operations. In such a drastic change, the information security issue encountered by organizations becomes increasingly significant. Information security risk assessment is the core of information security. It focuses on the assessments of assets with confidentiality, integrity and availability. Moreover, vulnerability of information systems and threats to the outside are also included in the scope of consideration. This study adopts fuzzy decision tree to evaluate the information security risk assessment for decision-makers. There are 155 input-output data with 22 attributes used to measure the value at risk obtained from ISO/IEC 27001 information security management system standard and ISO/IEC27005: 2008 Information technology. Another zoo dataset collected from UCI repository is also used to test the performance for the proposed algorithm. From simulation results, the proposed approach outperforms other existing approaches.
引用
收藏
页码:265 / 269
页数:5
相关论文
共 50 条
  • [1] Fuzzy decision tree induction for power system security assessment
    Boyen, XP
    Wehenkel, L
    [J]. CONTROL OF POWER PLANTS AND POWER SYSTEMS (SIPOWER'95), 1996, : 299 - 304
  • [2] Fuzzy decision tree approach for embedding risk assessment information into software cost estimation model
    Huang, SJ
    Lin, CY
    Chiu, NH
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (02) : 297 - 313
  • [3] LiSRA: Lightweight Security Risk Assessment for decision support in information security
    Schmitz, Christopher
    Pape, Sebastian
    [J]. COMPUTERS & SECURITY, 2020, 90
  • [4] Research on fuzzy group decision making in security risk assessment
    Liu, F
    Dai, K
    Wang, ZY
    Ma, J
    [J]. NETWORKING - ICN 2005, PT 2, 2005, 3421 : 1114 - 1121
  • [5] FUZZY DECISION TREE IN A HOMELAND SECURITY APPLICATION
    Garcia-Alegre, Maria C.
    Rivas, Javier
    Martin, David
    Santos, Matilde
    [J]. COMPUTATIONAL INTELLIGENCE: FOUNDATIONS AND APPLICATIONS: PROCEEDINGS OF THE 9TH INTERNATIONAL FLINS CONFERENCE, 2010, 4 : 335 - +
  • [6] Information security risk analysis model using fuzzy decision theory
    Henriques de Gusmao, Ana Paula
    Camara e Silva, Lucio
    Silva, Maisa Mendonca
    Poleto, Thiago
    Cabral Seixas Costa, Ana Paula
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (01) : 25 - 34
  • [7] Assessment of risk of information security by means of the theory of fuzzy sets
    Murathin, R.
    Satybaldina, D. Z.
    [J]. BULLETIN OF THE KARAGANDA UNIVERSITY-MATHEMATICS, 2015, 79 (03): : 66 - 74
  • [8] Application of Fuzzy Logic in the Process of Information Security Risk Assessment
    Kokles, Mojmir
    Filanova, Jana
    Korcek, Frantisek
    [J]. INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 1078 - 1088
  • [9] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    [J]. MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
  • [10] Information systems security risk assessment on improved fuzzy AHP
    Wu, Xiaoping
    Fu, Yu
    Wang, Jiasheng
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 365 - 369