350 rub
Journal Highly available systems №2 for 2014 г.
Article in number:
Evaluating the effectiveness of information security systems using fuzzy logic
Keywords:
security system of information
fuzzy logic
threats to information security
linguistic variables
Authors:
A. I. Kuralenko - Post-graduate Student, TUSUR. E-mail: Kuralenko@outlook.com
Abstract:
In the article the question of assessing the efficiency of information security. Such systems require periodic evaluation of the effectiveness. The existing approaches are based either on the performance requirements of the standards in the field of information security or risk management. That does not allow a quantitative estimate without considering the potential damage. Propose a method for quantitative evaluation of the effectiveness of knowledge-based expert on the probability of threats to information security and the adequacy of measures that can counter this threat. Moreover, the provision of such a system is formed as reference fuzzy statements that establish a connection between the fuzzy values of input and output parameters. It uses linguistic variables. Next, define the rules of fuzzy inference and membership functions are constructed for each of the linguistic variables, the knowledge base is formed. Knowing the values of the input parameters, the knowledge base using the algorithm Mamdani fuzzy inference, we obtain a quantitative estimate of the output for a specific security threat to information security. Assess the effectiveness of implementation of the method is executed in a batch environment FUZZY LOGIC in MATLAB. Simulation results with the specified input parameters are obtained adequate values of performance evaluation. Method of performance evaluation based on fuzzy logic is used to audit the information security of automated systems.
Pages: 61-64
References
- Andrianov V.V., Zefirov S.L., Golovanov V.B., Golduev N.A. Obespechenie informatsionnoy bezopasnosti biznesa. 2010. 265s.
- Domarev V.V. Bezopasnost' informatsionnykh tekhnologiy. Sistemnyy podkhod: K.: OOO «TID DS». 2004. 992s.
- Zade L. Ponyatie lingvisticheskoy peremennoy i ego primenenie k prinyatiyu priblizhyennykh resheniy. M.: Mir. 1976. 163 s.
- Tenetko M.I., Peskova O.Yu. Primenenie lingvisticheskikh peremennykh pri otsenki riskov informatsionnoy bezopasnosti // Izvestiya YuFU. Tekhnicheskie nauki. S. 72-77
- Kofman A. Vvedenie v teoriyu nechyetkikh mnozhestv. M.: Radio i svyaz'. 1982. 432 s.
- Kuralenko A.I., Gordeev V.V., Matveev A.A., Gushchin V.Yu., Grinyaev Yu.V. Ispol'zovanie nechetkoy logiki dlya postroeniya prosteyshey sistemy zashchity // Materialy Vseross. nauchno-tekhnich. konf. studentov, aspirantov i molodykh uchenykh. 4-7 maya 2010 g. Tomsk. Rossiya. Ch. 4. «V-Spektr». S. 16-18.