Risk assessment model of information security SVRAMIS

被引:3
作者
机构
[1] School of Computer Science and Technology, Xidian Univ.
来源
Wu, D. (jump_wude@163.com) | 2013年 / Science Press卷 / 40期
关键词
Information security; MEB; Risk assessment; Space position; SVDD;
D O I
10.3969/j.issn.1001-2400.2013.01.008
中图分类号
学科分类号
摘要
To solve the problems in information security risk assessment, such as inaccurate security classification and long assessment time, a risk assessment model of information security (RAMIS) is proposed based on Support Vector Domain Description (SVDD), and is called SVRAMIS for short. Firstly, SVDD is applied to obtain the minimal enclosing ball (MEB) of each class, and disconnect regions are obtained by the description boundary. Secondly, based on the information provided by the hypersphere centers and the hypersphere radius, the positions of the test samples are confirmed, so that corresponding discrimination rules can be adopted. Finally, numerical experiments on information security data demonstrate that, for various kernel functions, the proposed model can lead to high training and testing accuracies and short training time.
引用
收藏
页码:44 / 47+154
相关论文
共 50 条
[31]   The Application of Cloud Matter - element in Information Security Risk Assessment [J].
Dai Zong-you ;
Zhang Wen-long ;
Shen Yan-an ;
Wang Hai-tao .
2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, :218-222
[32]   Apply Fuzzy Decision Tree to Information Security Risk Assessment [J].
Lee, Zne-Jung ;
Chang, Li-Yun .
INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2014, 16 (02) :265-269
[33]   E-Government Information Security Risk Assessment Research [J].
Lei Ping ;
Lei Zhanbo .
2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 1, 2010, :1-4
[34]   Research on the application of neural networks to the security and risk assessment of information [J].
Lai, Kai ;
Wang, Yan .
International Journal of Digital Content Technology and its Applications, 2012, 6 (09) :132-140
[35]   The Information Security Risk Assessment Based on Fuzzy Comprehensive Evaluation [J].
Li Guohong ;
Cai Yongkai .
PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS A-C, 2008, :2027-2031
[36]   Information Security Risk Assessment by using Bayesian Learning Technique [J].
Foroughi, Farhad .
WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, :91-95
[37]   Risk assessment of digital library information security: a case study [J].
Han, Zhengbiao ;
Huang, Shuiqing ;
Li, Huan ;
Ren, Ni .
ELECTRONIC LIBRARY, 2016, 34 (03) :471-487
[38]   A Fuzzy Logic based Information Security Risk Assessment Method [J].
Yang, Yaling ;
Zhou, Yanhui .
MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 :3726-3730
[39]   An Organisational Model for Information Security Assessment [J].
McKissack, Jeremy ;
Hooper, Val ;
Hope, Beverley .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND EVALUATION, 2010, :218-227
[40]   Information security climate and the assessment of information security risk among healthcare employees [J].
Kessler, Stacey R. ;
Pindek, Shani ;
Kleinman, Gary ;
Andel, Stephanie A. ;
Spector, Paul E. .
HEALTH INFORMATICS JOURNAL, 2020, 26 (01) :461-473