Risk assessment model of information security SVRAMIS

被引:3
作者
机构
[1] School of Computer Science and Technology, Xidian Univ.
来源
Wu, D. (jump_wude@163.com) | 2013年 / Science Press卷 / 40期
关键词
Information security; MEB; Risk assessment; Space position; SVDD;
D O I
10.3969/j.issn.1001-2400.2013.01.008
中图分类号
学科分类号
摘要
To solve the problems in information security risk assessment, such as inaccurate security classification and long assessment time, a risk assessment model of information security (RAMIS) is proposed based on Support Vector Domain Description (SVDD), and is called SVRAMIS for short. Firstly, SVDD is applied to obtain the minimal enclosing ball (MEB) of each class, and disconnect regions are obtained by the description boundary. Secondly, based on the information provided by the hypersphere centers and the hypersphere radius, the positions of the test samples are confirmed, so that corresponding discrimination rules can be adopted. Finally, numerical experiments on information security data demonstrate that, for various kernel functions, the proposed model can lead to high training and testing accuracies and short training time.
引用
收藏
页码:44 / 47+154
相关论文
共 50 条
[21]   Information Security Risk Assessment in SCM [J].
Roy, Arup ;
Gupta, A. D. ;
Deshmukh, S. G. .
2013 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM 2013), 2013, :1002-1006
[22]   Automation of Information Security Risk Assessment [J].
Akhmetov, Berik ;
Lakhno, Valerii ;
Chubaievskyi, Vitalyi ;
Kaminskyi, Serhii ;
Adilzhanova, Saltanat ;
Ydyryshbayeva, Moldir .
INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (03) :549-+
[23]   An information systems security risk assessment model under uncertain environment [J].
Feng, Nan ;
Li, Minqiang .
APPLIED SOFT COMPUTING, 2011, 11 (07) :4332-4340
[24]   Information System Security Risk Assessment Based on IDAV Multi-Criteria Decision Model [J].
Yang, Jinning ;
Han, Jiazhen ;
Zhang, Xiuyan .
PROCEEDINGS OF 2018 12TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2018, :121-127
[25]   Information Security Risk Assessment Based on Two Stages Decision Model with Grey Synthetic Measure [J].
Luo, Hongsheng ;
Shen, Yongjun ;
Zhang, Guidong ;
Huang, Liangliang .
PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, :795-798
[26]   Risk Assessment Model of Information Security for Transportation Industry System Based on Risk Matrix [J].
Zhao Xiangmo ;
Dai Ming ;
Ren Shuai ;
Li Luyao ;
Duan Zongtao .
APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03) :1301-1306
[27]   Fuzzy OWA Model for Information Security Risk Management [J].
Imamverdiev, Ya. N. ;
Derakshande, S. A. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2011, 45 (01) :20-28
[28]   A Quantitative Model for Information-Security Risk Management [J].
Bojanc, Rok ;
Jerman-Blazic, Borka .
ENGINEERING MANAGEMENT JOURNAL, 2013, 25 (02) :25-37
[29]   Application of Fuzzy Logic in the Process of Information Security Risk Assessment [J].
Kokles, Mojmir ;
Filanova, Jana ;
Korcek, Frantisek .
INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, :1078-1088
[30]   The Application of Cloud Matter - element in Information Security Risk Assessment [J].
Dai Zong-you ;
Zhang Wen-long ;
Shen Yan-an ;
Wang Hai-tao .
2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, :218-222