Nothing Special   »   [go: up one dir, main page]

Skip to main content

Application of Big Data Intelligent Algorithms in Enterprise Security Risk Control

  • Conference paper
  • First Online:
Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1088))

  • 78 Accesses

Abstract

The daily production and life of the people are producing much data, and the speed is getting faster, which marks the formal arrival of the big data age. At present, China is accelerating the information construction in various fields. With the advancement of the construction process, the demand for information security guarantee is becoming more important. But many people think that information security can be solved as long as technology is guaranteed. However, with the construction of information security risk assessment system, the evaluation process and evaluation contents have been constantly improved, but it still lacks a scientific method of assessment, and the assessment tools are not mature enough. So the problems in the actual application of the assessment are still serious. In this context, the research focus of this paper is the periodic assessment model of risk. Machine learning methods are used to automatically identify threats in the network. Risk measurement based on VAR and quantitative model of complex risk are proposed in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Werner, P.O. Jueptner, Thomas M. Kreis, Ulrike Mieth, et al. 1994. Application of neural networks and knowledge-based systems for automatic identification of fault-indicating fringe patterns. Proceedings of SPIE—The International Society for Optical Engineering 2342: 16–26.

    Google Scholar 

  2. Jueptner, W.P.O., T.M. Kreis, W. Osten. 1994. Application of neural networks and knowledge-based systems for automatic identification of fault-indicating fringe patterns. In International Conference on Interferometry—International Society for Optics and Photonics: 16–26.

    Google Scholar 

  3. Papi, F., D. Tarchi, M. Vespe, et al. 2014. Radiolocation and tracking of automatic identification system signals for maritime situational awareness. Radar Sonar & Navigation Iet 9 (5): 568–580.

    Article  Google Scholar 

  4. Pillai, B.R., A.S. Kumar. 2008. A real-time system for the automatic identification of motorcycle—Using artificial neural networks. In International Conference on Computing, Communication and Networking, IEEE: 1–6.

    Google Scholar 

  5. Yang, H., J.M. Garibaldi. 2015. A hybrid model for automatic identification of risk factors for heart disease. Journal of biomedical informatics 58 (Suppl): S171.

    Article  Google Scholar 

  6. Bigan, C. 2002. A system for neural networks detection and automatic identification of EEG epileptic events, IET: 13/1–13/4.

    Google Scholar 

  7. Ziolkowski, V., Ivan N.D. Silva, R.A. Flauzino. 2007. Automatic identification of faults in power systems using neural network technique. IEEE International Conference on Control Applications: 813–818.

    Google Scholar 

  8. Djenouri, Y., A. Bendjoudi, and M. Mehdi. 2015. Gpu-based bees swarm optimization for association rules mining. The Journal of Supercomputing 71 (4): 1318–1344.

    Article  Google Scholar 

  9. Castelli, M., L. Manzoni, and L. Vanneschi. 2017. An expert system for extracting knowledge from customers’ reviews: The case of Amazon.com, Inc. Expert Systems with Applications 84: 117–126.

    Article  Google Scholar 

  10. Bayindir, R., I. Colak, and G. Fulli. 2016. Smart grid technologies and applications. Renewable and Sustainable Energy Reviews 66: 499–516.

    Article  Google Scholar 

  11. Ebesu, T., and Y. Fang. 2017. Neural semantic personalized ranking for item cold-start recommendation. Information Retrieval Journal 20 (2): 109–131.

    Article  Google Scholar 

  12. Fang, H., J. Zhang, and Y. Bao. 2013. Towards effective online review systems in the chinese context: A cross-cultural empirical study. Electronic Commerce Research and Applications 12: 208–220.

    Article  Google Scholar 

  13. Andrea, A., F. Ferri, P. Grifoni, and T. Guzzo. 2015. Approaches, tools and applications for sentiment analysis implementation. International Journal of Computer Applications 125: 26–33.

    Article  Google Scholar 

  14. Leiva, J., A. Palacios, and J. Aguado. 2016. Smart metering trends, implications and necessities: A policy review. Renewable and Sustainable Energy Reviews 55: 227–233.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaogang Gong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gong, X., Ye, W., Guo, Y., Chen, C. (2020). Application of Big Data Intelligent Algorithms in Enterprise Security Risk Control. In: Huang, C., Chan, YW., Yen, N. (eds) Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019). Advances in Intelligent Systems and Computing, vol 1088. Springer, Singapore. https://doi.org/10.1007/978-981-15-1468-5_223

Download citation

Publish with us

Policies and ethics