Journal of Advanced Sciences and Engineering Technologies (2019) 2(1) 1- 20
Risk and Vulnerability Analyses for the protection of Information for Future communication security Based Neural Networks
Information security risk analysis has increased the number of complex issues of information security, requiring the participation of specialists in different areas of knowledge. This leads to inability of such systems to evaluate the security state of computer system thoroughly.Present paper on the intellectual to risk analysis and vulnerability of information systems. The aim of the study is to eliminate subjectivity in the assessment of risks and reduction of time for the process of risk analysis and vulnerability of the computer system. The mathematical tools of artificial neural network and probabilistic attack tree were used in the research. In order to evaluate the efficiency of the developed system, the security assessment for the Windows systems was performed. As the result the conformity between the real security of the information system and the assigned evaluations was proved.
© 2018 JASET, International Scholars and Researchers Association
Copyright © 2018 by author(s) and This work is licensed under the Creative
Commons Attribution International
License (CC BY 4.0).
Keywords: Risk analysis; vulnerability validation; attack tree; artificial neural networks
. Al Smadi Takialddin, K. A. S., & Orayb, O. AL-Smadi, High-Speed for Data Transmission in GSM Networks Based on Cognitive Radio. American Journal of Engineering and Applied Sciences, 10(1), 69-77.
.Camtepe S. A., Yener B. A Formal Method for Attack Modeling and Detection // TR-06-01, Rensselaer Polytechnic Institute, Computer Science Department. 2006. URL: http://citeseer.ist.psu.edu/751069.html (15.03.2012).
.Sheyner O., Haines J., Jha S., Lippmann R., Wing J. M. Automated Generation and Analysis of Attack Graphs // Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, USA, 2002. P. 273–284.
. Ghaidan, K. A., Al Smadi, T. A., Aljumailly, T. A., & Al-Taweel, F. M. (2011). Development of a new approach for transmitting Digital message on a Frequency Limited Communication Channel transmission. Journal of Advanced Computer Science and Technology Research, 1, 52-62.
 Hussein, A. L., Trad, E., & Al Smadi, T. (2018). Proactive algorithm dynamic mobile structure of Routing protocols of ad hoc networks. IJCSNS, 18(10), 86.
.Xiao M, Fan S. X, Wu Z. (2009), ―A threat-centric model for information security risk assessment, Journal of Wuhan University of Technology, Vol. 31, No. 18, pp. 43-45.
. Yang Y, Yao S. Z.(2009), ―Risk assessment method of information security based on threat analysis‖.Computer Engineering and Applications, Vol. 45, No. 3, pp. 94-96.
.Yazar Z. A (2011), Qualitative risk analysis and management tool – CRAMM, SANS Institute InfoSec Reading Room. 2011.
 Al-Sawalha, A., & Al Smadi, T. (2018). Microstrip Patch Antenna Radiation Variation of Quality Factors and Bandwidth of a Conically Depressed. Journal of Advanced Sciences and Engineering Technologies, 1(1), 7.
.Zhang X, Huang Z, Wei G., Zhang X.(2010), ―Information security risk assessment methodologyresearch: Group decision making and analytic hierarchy process‖. In the Proceeding of IEEE the 2ndWorld Congress on Software Engineering, pp.157-60.
.56. Zhao D, Liu J, Zhang Z. (2009), ―Method of risk evaluation of information security based on neuralnetwork‖. IEEE international Conference on Machine Learning and Cybernetics, Vol. 1, No. 6,pp.1127-1132.
.Kijo, H. and Luo, J. (2012), ― Analysis on the competitiveness of Chinese steel and the southKorean‖, Software Computing in Information Communication Technology, Vol. 2, No. 1, pp. 451460.
.Manadhata, P. K., Karabulat, Y., & Wing, J. M. (n.d.). Report: Measuring the attack surfaces of enterprise software. Retrieved December 29, 2011, from Carnegie Mellon: School of Computer Science.
. Al Smadi Takialddin, O. I. A., & Agha, K. A. A. (2018). Overview of Model Free Adaptive (MFA) Control Technology.