Study of Artificial Neural Networks in Information Security Risk Assessment

Reza Ahmadi, Syed Ahmed Hamdan Shybt Movahed

Abstract


The principle of a more comprehensive information capital and organization in the information age and maintain it is very important in this research We decided to use the themes of artificialintelligence algorithms to identify information security risks and impact of Planning for security Reduce risk. Methodology: For this purpose we examined the IT organization referred to security measures based onthe Chkl sets the standard view and review the information we collect to attack the sources of information were both Clustering and classification of the information packet and a peak of the nightsaw the need of each one have for the probability of error And To Won According to the results of security measures and reduce the likelihood of attacks was effective in reducing dangerous attacks of the clustering of similar results, and they used the systemshows the data integrity of the system may be Drnha the data on the different organizational and (c) of Adhsaz the impact of security measures to assess. Results: The results of this research can help managers in assessing and rating the risk to information security in the organization of the system designed in this study may be Impact of security measures on the reduction of information security risksshow. Conclusion: after presentation of the organization and review the data and information available and the resources to implement the research model of this study in order to improve results and compliance with the the coin real information below to copy the proposed change found Login to have consisted of real attacks Statistics information to the relevant organization in order to carry out the investigation after the observation and study of the statistics Vvyzhgy attacks the nervous system sorted them by teaching the necessary research to cthe night of the the security risk information by using the algorithm of the themes of artificial intelligence 68 M to be in this way given the number 87789 in the neural network C of the conjugate graded 69 to 10 layers, and 5 percent were trained in control and test data.

 


Full Text:

PDF

References


Bahrami, M. 2011. provide a good way to develop indicators for the design and implementation of information security management in an organization, the Eighth International Conference on Community Iran, Persian date Shahrivar.

Feng, N., et al. 2014. "A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis." Information Sciences.

Honghui, N. & Yanling, S. 2010. "Reserch on Risk Assessment model of information security based on particle swarm alghorithm- RBF neural network".

Khezri Pour, F. 2013. provide a model for improving the organization's information security management assets in governmental offices in Kerman information security management system, the end of a PNU Shemirani, Winter.

Mehta, J. & Gawande. A. 2015. "A Purpose of Data Mining in Banking Sector." International Journal 3.

Nasiri floor, R. 2009. providing a secure virtual education model by looking at the issue of privacy and information security to the National Iranian Oil Company, Foot of Annamh Tarbiat Modarres University, autumn.

Ramos, S., et al. 2015. "A data-mining-based methodology to support MV electricity customers' characterization." Energy and Buildings.

Rahman, A. & Saba, T. 2014. "Evaluation of artificial intelligent techniques to secure information in enterprises."

Sendi, A., Jabbarifar, M., Hsajari, M. & dagenais, M. 2010. "FEMRA: fuzzy expert model for risk assessment" proc. Fifth international conference on internet monitoring and protection (ICIMP).

Silva, M., et al. 2014. "A multidimensional approach to information security risk management using FMEA and fuzzy theory." International Journal of Information Management.

Smith, J. 2006. presents a conceptual model of information security risk assessment (the Bank Sepah), leg of Annamh Al-Zahra University, summer.

Stoll, M. 2015. From Information Security Management to Enterprise Risk Management. Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering. T. Sobh and K. Elleithy, Springer International Publishing.

Wangl, Z. & Zeng, H. 2010. "study on the Risk Assessment Quantitive Method of Information Security", Proc. 3rd International Conference on Advanced Computer theory and Engineering.

Wie, G., Zhang, X. & Hung, Z. 2010. "reserch on E-government information Security Risk Assessment Based on Fuzzy AHP and Artificalt neural network model.

Yazdani, A. 2012. abstract Tvranlv, a hybrid model for information security risk assessment fuzzy environment.

Yazdi, Ali. & Mahdavi Arestani, S. 2013. the use of artificial neural networks in risk assessment of information security, electronic and cyber defense Journal, Winter.

Yousefi Khsrqy, H. 2008. risk assessment and risk analysis in the field of information security, the Seventh Conference on Quality and efficiency in the power industry, june.

Zahra, S., et al. 2015. "Novel centroid selection approaches for KMeans-clustering based recommender systems."Information Sciences 320: 156-189.

Marr, B. 2004. ''Measuring and benchmarking intellectual''.International journal. 11. 6:559-570.

Pew Tan, H., Plowman, D. & Hancock, P. 2007. Intellectual capital and financial returns of companies. Journal of Intellectual Capital. 8.1:76-95.

Roos. G., Roos, J. 1997. Measuring your compaies intellectual performance. Long Rage Planning. 30. 3:413-426.

Rose & Barrons. 2005. The Effect of Disclosing Intellectual Capital (The core asset for the third millennium economic entities) on the Internal and

External Finacial Statements.

Sanchez. M. & Scobar, C. 2000. The Delphi Method as a Validation Tool for the Guidelines for Measurement and Management of Intangibles. Paper

Presented at the Meritum Sevill Meeting, January 27-29.

Sundac, D. & Krmpotic, I. 2009. Measurement and management of intellectual capital. Tourism and Hospitality Management. 15. 2. 279-290.




DOI: https://doi.org/10.24200/jmas.vol7iss02pp1-10

Refbacks

  • There are currently no refbacks.