Abstract
With the increasing complexity of the network structure and the increasing size of the network, various network security incidents pose an increasing threat to the security of computer systems and the network. Especially, in the network environment, the diversified intrusion methods and application environment make the security of the network more fragile. In order to improve information security, based on fuzzy rule sets, this paper proposes a fuzzy association rule mining algorithm based on fuzzy matrix and applies it to security event correlation. In addition, this paper combines the embedded system to construct an information security risk assessment system and sets the system performance based on the actual situation. Finally, this paper carries out experimental design to verify the performance of the system and analyzes the experimental results by mathematical statistics. From the experimental research, it can be seen that the system constructed in this paper has a certain effect.
Highlights
Information security risk assessment has become an important means to ensure the security of information systems in enterprises and institutions
The existing information system security risk assessment methods can be roughly divided into two categories [1]
One is the system security analysis method based on multivariate statistics
Summary
Information security risk assessment has become an important means to ensure the security of information systems in enterprises and institutions. The other is the system security analysis method based on knowledge and decision technology This kind of method is usually based on the relevant knowledge and practical experience of the evaluator to perform corresponding reasoning on the existing nonquantitative data and information to realize the security risk assessment of the information system, so as to grasp the security status and potential risks of the entire information system. Such methods mainly rely on the professional knowledge and rich experience of experts to avoid the shortcomings of quantitative calculation methods in the process of information system risk assessment. Based on the above analysis, this paper studies the information security risk assessment method based on the fuzzy rule set, constructs the corresponding model structure, and verifies the system performance through experimental research
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.