Abstract
The daily production and life of the people are producing much data, and the speed is getting faster, which marks the formal arrival of the big data age. At present, China is accelerating the information construction in various fields. With the advancement of the construction process, the demand for information security guarantee is becoming more important. But many people think that information security can be solved as long as technology is guaranteed. However, with the construction of information security risk assessment system, the evaluation process and evaluation contents have been constantly improved, but it still lacks a scientific method of assessment, and the assessment tools are not mature enough. So the problems in the actual application of the assessment are still serious. In this context, the research focus of this paper is the periodic assessment model of risk. Machine learning methods are used to automatically identify threats in the network. Risk measurement based on VAR and quantitative model of complex risk are proposed in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Werner, P.O. Jueptner, Thomas M. Kreis, Ulrike Mieth, et al. 1994. Application of neural networks and knowledge-based systems for automatic identification of fault-indicating fringe patterns. Proceedings of SPIE—The International Society for Optical Engineering 2342: 16–26.
Jueptner, W.P.O., T.M. Kreis, W. Osten. 1994. Application of neural networks and knowledge-based systems for automatic identification of fault-indicating fringe patterns. In International Conference on Interferometry—International Society for Optics and Photonics: 16–26.
Papi, F., D. Tarchi, M. Vespe, et al. 2014. Radiolocation and tracking of automatic identification system signals for maritime situational awareness. Radar Sonar & Navigation Iet 9 (5): 568–580.
Pillai, B.R., A.S. Kumar. 2008. A real-time system for the automatic identification of motorcycle—Using artificial neural networks. In International Conference on Computing, Communication and Networking, IEEE: 1–6.
Yang, H., J.M. Garibaldi. 2015. A hybrid model for automatic identification of risk factors for heart disease. Journal of biomedical informatics 58 (Suppl): S171.
Bigan, C. 2002. A system for neural networks detection and automatic identification of EEG epileptic events, IET: 13/1–13/4.
Ziolkowski, V., Ivan N.D. Silva, R.A. Flauzino. 2007. Automatic identification of faults in power systems using neural network technique. IEEE International Conference on Control Applications: 813–818.
Djenouri, Y., A. Bendjoudi, and M. Mehdi. 2015. Gpu-based bees swarm optimization for association rules mining. The Journal of Supercomputing 71 (4): 1318–1344.
Castelli, M., L. Manzoni, and L. Vanneschi. 2017. An expert system for extracting knowledge from customers’ reviews: The case of Amazon.com, Inc. Expert Systems with Applications 84: 117–126.
Bayindir, R., I. Colak, and G. Fulli. 2016. Smart grid technologies and applications. Renewable and Sustainable Energy Reviews 66: 499–516.
Ebesu, T., and Y. Fang. 2017. Neural semantic personalized ranking for item cold-start recommendation. Information Retrieval Journal 20 (2): 109–131.
Fang, H., J. Zhang, and Y. Bao. 2013. Towards effective online review systems in the chinese context: A cross-cultural empirical study. Electronic Commerce Research and Applications 12: 208–220.
Andrea, A., F. Ferri, P. Grifoni, and T. Guzzo. 2015. Approaches, tools and applications for sentiment analysis implementation. International Journal of Computer Applications 125: 26–33.
Leiva, J., A. Palacios, and J. Aguado. 2016. Smart metering trends, implications and necessities: A policy review. Renewable and Sustainable Energy Reviews 55: 227–233.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gong, X., Ye, W., Guo, Y., Chen, C. (2020). Application of Big Data Intelligent Algorithms in Enterprise Security Risk Control. In: Huang, C., Chan, YW., Yen, N. (eds) Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019). Advances in Intelligent Systems and Computing, vol 1088. Springer, Singapore. https://doi.org/10.1007/978-981-15-1468-5_223
Download citation
DOI: https://doi.org/10.1007/978-981-15-1468-5_223
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1467-8
Online ISBN: 978-981-15-1468-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)