Evaluating the Network and Information System Security Based on SVM Model

نویسندگان

  • Shaomei Yang
  • Donglei Liu
  • Zhibin Liu
چکیده

With more and more e-business operating on line, the network and information security problem is not only confined to the concept of network technical systems, but at the same time has special significance beyond network itself, which is economic ties, cultural transmission media, the social operation and management way and so on. Based on the analysis of the security importance and security evaluation present, this paper establishes a security evaluation system and describes the evaluation mechanism based on SVM algorithm and model. The security evaluation of 12 network enterprises in Beijing shows that the results given by this model are reliable, and this method to evaluate the network and information system security is feasible.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

Evaluating the quality of e-banking services in the Iranian banking network by using the Servqual model

Today, the quality of services is an increasingly important factor in the success and survival of the banking sector. Therefore, the discovery of effective factors in the quality of services and the importance of each of these factors is very important from the point of view of customers due to the increasing intensity of competition. Modern com- merce requires appropriate tools and infrastruct...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JCP

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2009