skip to main content
10.1145/2799979.2800022acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Information security risk management in computer networks based on fuzzy logic and cost/benefit ratio estimation

Authors Info & Claims
Published:08 September 2015Publication History

ABSTRACT

We suggested a method for quantitative information security risk management in computer networks. We used fuzzy estimations of the risk factors and quantitative risk assessment method under the safeguards. We used analytic hierarchy process for quantitative assessment of qualitative risk and cost/benefit subfactors. We used optimization tasks for selection the best set of safeguards.

References

  1. Alberts, C., Dorofee, A. 2002. Managing information security risks. The OCTAVESM approach. Addison Wesley. pp 512. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Anikin, I. 2014. Information Security Risks Assessment Method Based on AHP and Fuzzy Sets. In Proceedings of 2nd Intl' Conference on Advanced in Engineering Sciences and Applied Mathematics (ICAESAM'2014), May 4-5, 2014 Istanbul (Turkey), pp. 11--15. DOI= http://dx.doi.org/10.15242/IIE.E0514043.Google ScholarGoogle Scholar
  3. Anikin, I. 2014. Knowledge Representation Model and Decision Support System for Enhanced Oil Recovery Methods. In Proceedings of Intl' conference on Intelligent Systems, Data Mining and Information Technology (ICIDIT'2014), April 21-22, 2014 Bangkok (Thailand), pp. 101--105. DOI= http://dx.doi.org/10.15242/IIE.E0414004.Google ScholarGoogle Scholar
  4. Anikin, I. 2015. Vulnerability Risk Assessment Method Based on Fuzzy Logic. In Proceedings of the 2nd National Conference on Information Technology and Computer Science (CITCS 2015), 2015, Shanghai, March 21-22, pp. 1554--1560.Google ScholarGoogle Scholar
  5. Anikin, I. V., Gilmullin, T. M. 2013. The Method and Fuzzy Expert System for Information Security Risk Assessment and Management. In Varia Informatica. 2013. Lublin: PIPS Polish Information Processing Society, 2013. -- pp. 55--68.Google ScholarGoogle Scholar
  6. Behnia, A., Rashid, R. A., Chaudhry, J. A. 2012. A Survey of Information Security Risk Analysis Methods. Smart Computing Review, vol. 2, No. 1, 2012, pp. 79--94. DOI= http://dx.doi.org/10.6029/smartcr.2012.01.007Google ScholarGoogle Scholar
  7. Clymer, C., Stasiak, K., Neely, M., Marchewitz, S., iRisk Ecaluation. SecureState Whitepaper. https//www.securestate.comGoogle ScholarGoogle Scholar
  8. Conkling, W. R., Hamilton, Jr, J. A. D. 2008. The importance of information security spending: An economic approach. In Proceedings of the 2008 Spring Simulation Multiconference, SpringSim'08. 2008. Pages 293--300. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. CVSS V.2.0. A Complete Guide to the Common Vulnerability Scoring System. http://www.first.org/cvss/cvss-guide.pdf.Google ScholarGoogle Scholar
  10. Kanungo, S., Jain, V., Forman, E. H. 2011. Maximizing resource allocation effectiveness for IT security investments. International Journal of Business Information Systems. Volume 7, Issue 2, February 2011, Pages 166--180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Karabacaka, B., Sogukpinar, I. ISRAM: information security risk analysis method. Computers app. Security, vol. 24, pp. 147--159, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. NIST SP 800-30 Revision 1. 2012. Guide for Conducting Risk Assessments (September 2012).Google ScholarGoogle Scholar
  13. Peltier, T. R. 2010. Information Security Risk Analysis, third ed. Auerbach Publications. 2010. 456 pp. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. PRINCE User's Guide to CRAMM. Stationery Office Books, 1993. 140 pp.Google ScholarGoogle Scholar
  15. Risk Management Insight LLC. FAIR (FACTOR ANALYSIS OF INFORMATION RISK) Basic Risk Assessment Guide. Risk Management Insight LLC, 2006.Google ScholarGoogle Scholar
  16. Saaty, T. L. 2001. Decision Making for Leaders: The Analytic Hierarchy Process for Decisions in a Complex World. 3rd Revised edition. RWS Publications. 2001. 323 pp.Google ScholarGoogle Scholar

Index Terms

  1. Information security risk management in computer networks based on fuzzy logic and cost/benefit ratio estimation

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            SIN '15: Proceedings of the 8th International Conference on Security of Information and Networks
            September 2015
            350 pages
            ISBN:9781450334532
            DOI:10.1145/2799979

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 8 September 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper

            Acceptance Rates

            SIN '15 Paper Acceptance Rate34of92submissions,37%Overall Acceptance Rate102of289submissions,35%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader