Advertisement

Quantitative Evaluation Model for Information Security Risk of Wireless Communication Networks Under Big Data

  • Bin-bin JiangEmail author
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 301)

Abstract

Quantitative evaluation of information security risk in wireless communication network can effectively guarantee the security of communication network. In order to solve the problem that the traditional network security evaluation method is not effective, a quantitative risk assessment model of wireless communication network information security under big data is constructed. Using the wireless composition and working principle, the risk assessment system of wireless communication is built, and the index weight is determined. On this basis, the network information function interface is deployed, and the initial probability is calculated, and the quantitative risk assessment model of wireless communication network information security under big data is constructed. The experimental results show that under the condition of increasing the frequency of network attack, the security potential value of the model is always at a higher level, which indicates that the model has better performance and is helpful to detect the security of the system. It is convenient to provide accurate safety protection measures in time to resist safety risks.

Keywords

Security risk assessment Big data Risk quantification Information safety 

References

  1. 1.
    Liu, H.: Security evaluation and simulation of privacy information transmission based on big data analysis. Comput. Simul. 35(2), 342–345 (2018)Google Scholar
  2. 2.
    Chen, X., Chen, H., Wang, C., et al.: Information security risk assessment based on BP neural network. Inf. Commun. 184(4), 170–171 (2018)MathSciNetGoogle Scholar
  3. 3.
    Li, L., Lian, Y.: Network information security transmission simulation of large data mobile terminal. Comput. Simul. 35(6), 194–198 (2018)Google Scholar
  4. 4.
    Chai, J., Wang, S., Liang, H., et al.: Quantitative method of information security risk assessment elements based on analytic hierarchy process. J. Chongqing Univ. 40(4), 44–53 (2017)Google Scholar
  5. 5.
    Wang, H., Fan, K., Mo, W.: Information security risk assessment based on improved DS evidence theory and BN. Telev. Technol. 41(6), 24–30 (2017)Google Scholar
  6. 6.
    Guan, T.: Design and implementation of information security risk assessment system for electric power industry. Netw. Secur. Technol. Appl. 11, 122–124 (2017)Google Scholar
  7. 7.
    Tang, W., Wang, J., Yang, R., et al.: Quantitative risk assessment of large power grid operation based on support vector machine. J. Hefei Univ. Technol. (Nat. Sci. Ed.) 40(4), 486–491 (2017)Google Scholar
  8. 8.
    Fu, C., Wang, X., Zhang, W., et al.: A component security attribute model driven information security risk assessment approach for train control center. Tiedao Xuebao/J. China Railw. Soc. 39(8), 77–84 (2017)Google Scholar
  9. 9.
    Chai, T., Weng, J., Xiong, D.Q.: Development of a quantitative risk assessment model for ship collisions in fairways. Saf. Sci. 91, 71–83 (2017)CrossRefGoogle Scholar
  10. 10.
    Jing, X., Hu, H., Yang, H., et al.: A quantitative risk assessment model involving frequency and threat degree under line-of-business services for infrastructure of emerging sensor networks. Sensors 17(3), 642 (2017)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.School of SoftwareNanyang Institute of TechnologyNanyangChina

Personalised recommendations