skip to main content
10.1145/2791405.2791492acmotherconferencesArticle/Chapter ViewAbstractPublication PageswciConference Proceedingsconference-collections
research-article

Information Risk Analysis in a Distributed MOOC Based Software System Using an Optimized Artificial Neural Network

Authors Info & Claims
Published:10 August 2015Publication History

ABSTRACT

Information security is of utmost importance to any organization. With the increasing number of attacks on private data, understanding the risk involved with handling and maintaining it is relevant. Although there are various methods to determine the risk associated with a certain organization's data, there is also a need to speed up the process of computation of this risk. This paper discusses the usage of Artificial Neural Networks that bodes well for the non linear nature of the threat vectors that affect risk involved in setting up a distributed MOOC based software system. An optimization to the existing methods is proposed that makes use of the bio inspired, Cuckoo Search Algorithm. With the concept of Levy Flights and Random Walks, this algorithm produces a much faster rate of convergence in calculation of the importance to be given to each threat vector in assessing the security of the software system.

References

  1. Bin Luo, Yi Liu, The Risk Evaluation Model of Network information security Based on Improved BP Neural Network IMSNA, 2012.Google ScholarGoogle Scholar
  2. Sudarshan Nandy, Partha Pratim Sarkar and Achintya Das, Training a Feed Forward Neural Network With a Practical Bee Colony Based Back Propogation Method IJCSIT, 2012.Google ScholarGoogle Scholar
  3. Nazri Mohd. Nawi, Abdullah Khan, M. Z. Rehman, A New Back-Propagation Neural Network Optimized with Cuckoo Search Algorithm Springer-Verlag Berlin Heidelberg, 2013.Google ScholarGoogle Scholar
  4. Yao Youli, Liu Jie, Jia Quan, Risk Assessment Model for E-commerce Security based on FCE International Symposium on Web Information Systems and Applications, 1991.Google ScholarGoogle Scholar
  5. Dong-Mei Zhao, Jin-Xing Liu, Ze-Hong Zhang, Method of Risk Evualtion Using Information Security Using Neural Networks Eighth International Conference on Machine Learning and Cybernetics, 2009.Google ScholarGoogle Scholar
  6. Bilge Karabacaka, Ibrahim Sogukpinar, ISRAM: information security risk analysis method Elsevier, 2005.Google ScholarGoogle Scholar
  7. Bob Blakley, Ellen McDermott, Dan Geer, Information security is information risk management Proceedings of the 2001 workshop on New security paradigms, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dong-Mei Zhao, Jin-Xing Liu, Ze-Hong Zhang, Information security: The moving target Journal of Computers and Security, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Information Risk Analysis in a Distributed MOOC Based Software System Using an Optimized Artificial Neural Network

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          WCI '15: Proceedings of the Third International Symposium on Women in Computing and Informatics
          August 2015
          763 pages
          ISBN:9781450333610
          DOI:10.1145/2791405

          Copyright © 2015 ACM

          © 2015 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 10 August 2015

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          WCI '15 Paper Acceptance Rate98of452submissions,22%Overall Acceptance Rate98of452submissions,22%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader