[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2791405.2791492acmotherconferencesArticle/Chapter ViewAbstractPublication PageswciConference Proceedingsconference-collections
research-article

Information Risk Analysis in a Distributed MOOC Based Software System Using an Optimized Artificial Neural Network

Published: 10 August 2015 Publication History

Abstract

Information security is of utmost importance to any organization. With the increasing number of attacks on private data, understanding the risk involved with handling and maintaining it is relevant. Although there are various methods to determine the risk associated with a certain organization's data, there is also a need to speed up the process of computation of this risk. This paper discusses the usage of Artificial Neural Networks that bodes well for the non linear nature of the threat vectors that affect risk involved in setting up a distributed MOOC based software system. An optimization to the existing methods is proposed that makes use of the bio inspired, Cuckoo Search Algorithm. With the concept of Levy Flights and Random Walks, this algorithm produces a much faster rate of convergence in calculation of the importance to be given to each threat vector in assessing the security of the software system.

References

[1]
Bin Luo, Yi Liu, The Risk Evaluation Model of Network information security Based on Improved BP Neural Network IMSNA, 2012.
[2]
Sudarshan Nandy, Partha Pratim Sarkar and Achintya Das, Training a Feed Forward Neural Network With a Practical Bee Colony Based Back Propogation Method IJCSIT, 2012.
[3]
Nazri Mohd. Nawi, Abdullah Khan, M. Z. Rehman, A New Back-Propagation Neural Network Optimized with Cuckoo Search Algorithm Springer-Verlag Berlin Heidelberg, 2013.
[4]
Yao Youli, Liu Jie, Jia Quan, Risk Assessment Model for E-commerce Security based on FCE International Symposium on Web Information Systems and Applications, 1991.
[5]
Dong-Mei Zhao, Jin-Xing Liu, Ze-Hong Zhang, Method of Risk Evualtion Using Information Security Using Neural Networks Eighth International Conference on Machine Learning and Cybernetics, 2009.
[6]
Bilge Karabacaka, Ibrahim Sogukpinar, ISRAM: information security risk analysis method Elsevier, 2005.
[7]
Bob Blakley, Ellen McDermott, Dan Geer, Information security is information risk management Proceedings of the 2001 workshop on New security paradigms, 2001.
[8]
Dong-Mei Zhao, Jin-Xing Liu, Ze-Hong Zhang, Information security: The moving target Journal of Computers and Security, 2009.

Cited By

View all
  • (2017)Anomaly detection survey for information securityProceedings of the 10th International Conference on Security of Information and Networks10.1145/3136825.3136904(251-258)Online publication date: 13-Oct-2017

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
WCI '15: Proceedings of the Third International Symposium on Women in Computing and Informatics
August 2015
763 pages
ISBN:9781450333610
DOI:10.1145/2791405
© 2015 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 August 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cuckoo Search Algorithm
  2. Information Security
  3. Neural Networks
  4. Risk Assessment

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

WCI '15

Acceptance Rates

WCI '15 Paper Acceptance Rate 98 of 452 submissions, 22%;
Overall Acceptance Rate 98 of 452 submissions, 22%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2017)Anomaly detection survey for information securityProceedings of the 10th International Conference on Security of Information and Networks10.1145/3136825.3136904(251-258)Online publication date: 13-Oct-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media