By Topic

Method of risk evaluation of information security based on neural networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Dong-Mei Zhao ; Sch. of Inf. Technol., Hebei Normal Univ., Shijiazhuang, China ; Jin-Xing Liu ; Ze-Hong Zhang

Risk assessment of information security is an important assessment method and decision mechanism in the process of making information security system. The risk evaluation is a process of computing risk value by means of risk assessment, which is from assessment and evaluation of assets, threats, and vulnerabilities to the risk evaluation of information asset. Focused on the uncertainty and complexity of information, we integrate the artificial neural network to apply them in studying risk evaluation. Firstly, since the artificial neural network is suited for the quantity data processing, and poor to the qualitative analyze, and risk is uncertain, the risk factors are quantized by fuzzy evaluation method proposed in this dissertation so that the input of ANN are pre-treated. Secondly, wavelet analysis and the neural network is integrated, we apply them in studying risk evaluation. The shortcomings of the neural network can be overcome, such as a slower study velocity and lower fit accuracy. The simulation results show that risk level of the information system can be evaluated quantitatively by trained neural network, and the shortcomings of current evaluating methods can be overcome, such as more subjectivity and fuzzy conclusion.

Published in:

Machine Learning and Cybernetics, 2009 International Conference on  (Volume:2 )

Date of Conference:

12-15 July 2009