Startseite Risk assessment of computer network information using a proposed approach: Fuzzy hierarchical reasoning model based on scientific inversion parallel programming
Artikel Open Access

Risk assessment of computer network information using a proposed approach: Fuzzy hierarchical reasoning model based on scientific inversion parallel programming

  • Weihua Feng EMAIL logo
Veröffentlicht/Copyright: 29. November 2023
Veröffentlichen auch Sie bei De Gruyter Brill

Abstract

Background

Computer networks are involved in many fields such as business, education, marketing, government, and tourism in several forms. Technologies related to security protection and improvement of information integrity are used and developed for computer networks intruded on by unauthorized people and help save their confidentiality.

Methods

To improve the risk identification of computer networks, this manuscript combined a fuzzy hierarchical reasoning model with the scientific inversion parallel programming method to study the risk of computer networks. Moreover, this article defined and analyzed a d-order neighborhood message propagation algorithm. A d-order neighborhood parallel message propagation algorithm using the Gaussian graph model was proposed.

Results

The risk of the computer network was analyzed using the proposed method resulting in better protection effectiveness.

Conclusion

The simulations showed that the proposed algorithm could effectively detect risks and improve the security of the computer network.

1 Introduction

Computer networks are involved in many fields such as business, education, marketing, government, and tourism in the forms of Local Area Networks (LAN), Wide Area Networks, Wireless LAN, Metropolitan Area Networks, and Campus Area Network. Technologies related to security protection and improvement are used to computer networks intruded on by unauthorized people and help save their confidentiality. The security of computer networks in the computer science field mainly refers to the safe operation status of Internet operations and is based on relevant anti-virus software aiming at preventing intrusions and ensuring operations run securely. In addition, it also refers to better maintaining the reliability of computer networks and curbing intrusions whose aims are to steal confidential information. Thus, a safer computer network environment has been searched by researchers and the industry.

The widely implemented several high and new technologies have greatly improved efficiency in several areas such as industry, education, and government. Hence, a more information-oriented society has evolved. More specifically, shopping, education, entertainment, and marketing implementations have developed highly and evolved into new forms. For example, installment and rental operations, online entertainment methods enabling users to buy online movies and digital albums, and payment and booking platforms become new and attractive applications. Information technology has changed the rhythm of society [1].

However, it should also be noted that more and more security issues related to computer networks have emerged with the wide implementation and penetration of information technologies in several areas. Cybercrimes, especially those conducted on Internet operations, have been steadily increasing. A great many Internet users are concerned about their privacies and network security [2]. Moreover, the security issues of network information not only affect individual users but also impact companies and governments and could cause huge losses in terms of money and secure information. Therefore, it is a long-standing issue that requires continuous improvements. The security of computer network information is based on establishing a robust and sturdy management system that minimizes intrusions led by big data applications. Safeguarding the personal information of citizens and their legitimate rights and interests purely depends on better developments in computer network technology [3].

The security of computer network information has become a key factor affecting normal operations and requires high standard protection covering end-to-end applications [4]. Therefore, to carry out efficient management of computer networks, more advanced technologies and implementations are required to be developed to protect data, secure managerial operations, decrease the maintenance cost of the system, and meet the needs of users. So, the integrity of computer networks is solidified [4]. When the current literature is under consideration, many factors exist that affect those substantial pillars of computer networks. For example, physical and logical securities should be better constructed. By doing so, efficient storage and transmission of various data is conducted, and the integrity of information is assured. However, the problems encountered in computer networks are very complex. Thus, a comprehensive approach should be taken covering not only the need to pay attention to the information security of the hardware but also the need to manage the software to avoid hackers’ attacks and virus intrusions. When computer networks are attacked, security loopholes that exist would also have an impact on information security. The existence of loopholes may be affected by the design factors of the software system and may also be interfered with by other external factors [5]. Hence, the analyses of vulnerabilities existing in normal operations need to be paid attention, and effective measures should be taken to prevent external network attacks. In the routine maintenance of the computer network system, if problems are detected, information leakage would occur, which would adversely affect the normal operation of the computer network system and hinder the safe operation of the network. This requires a comprehensive analysis of security measurements and taking measures against virus attacks and intrusions an all-around defense [6].

The information age brings new developments, opportunities, and lifestyle changes to users but also puts new security threats. With the rapid development of social informatization construction that is important to both the national economy and social development, information systems are increasingly dependent on national infrastructural systems such as banking, telecommunications, and electricity. Information security has become one of the foundations of national security [7]. If a security problem occurs in the information system, it will disrupt social life or cause economic losses, and at worst, the entire country’s politics, economy, and military will be paralyzed, social order will be out of control, and national security will face severe challenges. By carrying out the risk assessment of computer networks, computer networks and information integrity are frequently checked, and the issues would be detected before they grow into a threat [8]. The risk assessment of computer networks and information security is the fundamental assurance based on scientific methods and means to list security requirements and determine security priorities.

The risk assessment of computer networks and information integrity as a problem is not only a conceptual issue of systems engineering, but also involves various aspects such as policies, laws and regulations, and the implementation of standard technologies. To fundamentally resolve the security issue of the information system, it is not enough to rely on technical means alone. More comprehensive measures are needed to combine tools [9]. The primary goal of information security is to analyze issues from the perspective of systems engineering. Through risk assessment of the security issues of the information system, threats, impacts, and vulnerabilities are fully considered to determine the security risk level. Then, effective security policies and guidelines could be formulated to provide stronger measures and guarantees for the safe operation of information systems [10]. The risk assessment of information security informs managerial bodies to understand the current risk status, evaluate security threats and impacts that may cause irreversible harm, and provide a scientific basis to choose and implement security strategies. Finally, future risks can be predicted based on recent developments [11].

To sum up, information security has important practical value and far-reaching significance for establishing a better information security assurance system.

The literature presents the risk assessment methods of information security, which can be divided into security baseline assessment methods using best practices, and asset-based threat analysis methods [12]. When the assessment scope is under consideration, host risk, network risk, and system risk assessment methods are used. On the other hand, when the evaluation methods are under consideration, model-based, standard-based, and knowledge-based evaluations are implemented. Self-assessment, commissioned assessment, and inspection assessment methods are used when the assessment is singly a concern [13]. When the operation modes used in the evaluations are a concern, manual, semi-automatic, and automatic evaluations are made. When the contents of the assessment are under consideration, management risk, technical risk, and natural risk assessments are used [14].

When people carry out systematic analyses regarding problems in economy, engineering, management, and science, they often face complex forms lacking quantitative data. Moreover, various interrelated and restrictive factors coexist.

The analytic hierarchy process (AHP) provides a new, simple, and practical decision-making method for solving problems [15]. The basic idea of AHP is to regard the decision-making problem as a large system composed of many components that are interrelated and mutually restrictive factors arranged into several levels changing from high to low according to their affiliation. The score of each factor is computed using computational procedures [16], and finally, ranking is reached, which is used as a basis for decision-making. AHP decomposes complex issues into variables with several levels and factors through hierarchical, quantitative, and normalized processing. Then, the factors are compared, judged, and calculated regarding corresponding levels to generate weights. For each alternative, each weight is multiplied by each factor, and the final score is computed. Finally, the overall risk profile of each alternative is computed and ranked to determine the final decision [17].

This article combines the fuzzy hierarchical reasoning model with the scientific inversion parallel programming method to study the risk assessment of computer networks and information integrity and proposes a system to measure the risk assessment of computer networks to improve the security of computer networks and information integrity.

2 Fuzzy hierarchical reasoning model

2.1 Gaussian graph model (GGM)

The GGM’s Markov property is very significant since the structure of the model reflects the conditional independence between variables, i.e., the inaccessible nodes of the graph structure represent the conditional independence between the variables of the graph model [1820]. Variables in GGM’s distributed exponential probability distribution just reveal the Markov property. The exponential probability distribution of the Gaussian vector x is represented by:

(1) p ( x ) exp h , x + 1 2 J , x x T .

The index parameters of the Gaussian distribution are denoted by h and J. J, and the sparsity of the exponential parameter matrix, reflects the Markov property of the models; specifically, if the edge ( i , j ) E , then J i j = 0 .

The GGM and its exponential probability distribution are given, and the key to conducting probabilistic reasoning is based on calculating the marginal probability distributions of variables. According to the relationship between the index and the distance parameters, the expected value and variance of the variable can be directly calculated as follows:

(2) μ = J 1 h ,

(3) K = J 1 .

The mean vector is represented by μ = E { x } , and K = E [ ( x μ ) ( x μ ) T } represents the covariance matrix. The computational complexity of accurate inference through exponential parameters is O ( n 3 ) , where n denotes the model size, and the implemented method is only qualified for medium-sized GGMs.

Various approximate inference methods have been developed since then. The loop belief propagation (LBP) method is used to directly apply the belief propagation (BP) method on a tree structure of a looped graph model. Then, the approximations of the univariate expectation and variance are calculated. If the LBP method converges, the expected value converges to the exact value, but an approximation of the variance is calculated, which is proven mathematically. The theorem has given sufficient conditions for the convergence of the LBP method. However, the LBP algorithm does not converge in some special cases, and the convergence speed is slow when the scale of GGMs is large. When the approximation method called the Gaussian mean field method is implemented, the expected value converges to the exact value. However, variance is calculated approximately.

A d-order neighborhood message propagation algorithm based on the GGM is proposed. The algorithm combines belief message propagation (BMP) and mean field message propagation and performs more accurate message propagation in the d-order neighborhood elimination of variables, which can calculate variables’ approximate values of marginal probability distributions in linear time. Specifically, the concept of the d-order neighborhood of variables in the Gaussian elimination process is first defined, which is used to describe the propagation range of the message in the elimination process. Then, the process of the neighborhood message propagation of variables using d-order elimination is analyzed, and the Gaussian MP-d parallel algorithm is proposed. Finally, the computational complexity of the Gaussian MP-d algorithm and the lower bound of the marginal probability distribution are analyzed.

2.2 Gaussian elimination

The key problem of probabilistic reasoning in the GGM is to calculate the marginal probability distribution of variables. Gaussian elimination is one of the exact probabilistic reasoning methods and is also the basis of the Gaussian BMP algorithm. According to the Gaussian elimination method, the marginal probability distribution of variable subsets can be calculated. If x B is eliminated, the marginal probability distribution of the variable set x A = x / x B is calculated, the marginal probability distribution x A is still Gaussian distribution, and its index parameters { J A , h A } are denoted by:

(4) J A = J A , A J A , B ( J B , B ) 1 J B , A ,

(5) h A = h A J A , B ( J B , B ) 1 h B .

Then, the marginal probability distribution of the variable x A after Gaussian elimination is conducted is denoted by:

p ( x A ) = x B p ( x A , x B ) d x B exp h A , x A + 1 2 J A , x A x A T .

According to the Gaussian elimination method presented in Eqs. (4) and (5), the univariate elimination process of the GGM is analyzed. If the variable x s is eliminated, the marginal probability distribution p ( x U ) x U = x / x s can be calculated, and its index parameters { J U , h U } are denoted by:

J U = J U , U J U , s J s , s 1 J s , U h U = h U J U , s J s , s 1 h s .

Specifically, when the variable x s is eliminated, the parameters of the adjacent node x s of the variable x t , t N ( s ) will be affected and denoted by:

J t t J t t + J s t 2 J s s h t h t + J s t J s s h s .

It will affect the edge parameters { t , u } between any two adjacent nodes x t , x u of the variable x s , namely:

J t u J t u + J s t J s u J s s .

For the lattice GGM with a dimension 4 × 4 presented in Figure 1(a), the elimination process of the underlying nodes one at a time is shown in Figure 1. For example, the elimination processes of nodes 13, 14, 15, and 16 are shown in Figure 1(a), (b), (c), and (d), respectively. Figure 1 depicts that as the number of elimination nodes increases, the computational complexity of Gaussian variable elimination increases.

Figure 1 
                  Elimination process of exact variables in the GGM represented by a–d.
Figure 1

Elimination process of exact variables in the GGM represented by a–d.

2.3 3d-order neighborhood and message propagation

This subsection defines the concept of Gaussian elimination d-order neighborhood and analyzes the message propagation process of the d-order neighborhood.

Definition 1

(d-th order neighborhood): For the GGM G, the d-th order neighborhood elimination of node i (referred to as the d-th order neighborhood) is denoted as N d ( i ) , and the recursive definition is presented as follows:

  1. The set of neighbor nodes of node i is called the first-order neighborhood denoted by: N 1 ( i ) = { j ( i , j ) E } .

  2. s N 1 ( i ) , t N 1 ( i ) is established. When the edge (s, t) needs to be added and the elimination i is run, it is marked as follows:

    s N 2 ( t ) , t N 2 ( s ) .

  3. u N a ( i ) , v N b ( i ) is established. When the edge (u, v) needs to be added and the elimination i is run, it is marked as follows:

u N a + b ( v ) , v N a + b ( u ) .

Definition 2

(d-order neighborhood): For the GGM G, assumed that N d ( i ) represents the d-th order neighborhood of node i, then the first d-order neighborhood of node i (referred to as the d-order neighborhood) is denoted by:

N d ( i ) = N 1 ( i ) N d ( i ) .

The d-order neighborhood of a node is closely related to the variable elimination process, and variables may have different d-order neighborhoods in different elimination processes. According to the elimination order of 13, 14, 15, and 16, the d-order neighborhoods of nodes {13, 14, 15, 16}, Figure 1 depicts the variable elimination process of GGM as an example.

N 1 ( 13 ) = { 9 , 14 } N 1 ( 14 ) = { 13 , 10 , 15 } , N 2 ( 14 ) = { 9 } N 1 ( 15 ) = { 14 , 11 , 16 } , N 2 ( 15 ) = { 10 } , N 3 ( 15 ) = { 9 } N 1 ( 16 ) = { 12 , 15 } , N 2 ( 16 ) = { 11 } , N 3 ( 16 ) = { 10 } , N 4 ( 16 ) = { 9 } .

Assuming that I represents the elimination sequence, I elim denotes the node sequence that has been eliminated in the elimination process, I left represents the remaining node sequence, N d ( i ) represents the d-th order neighborhood of node i, and N d ( i ) represents the first d-order neighborhood of node i.

The Gaussian variable MP-d method consists of four basic steps as follows:

  1. Update the relevant parameters of the variable x i .

The first (d + 1) order neighborhood of the variable x i is labeled. First, the parameters { J ˆ i i , h ˆ i , J ˆ i j } of the variable x i are updated with the message passed by the eliminated variable, namely,

(6) J ˆ i i = J i i + j ( N d + 1 ( i ) ) I e l i m Δ J j i h ˆ i = h i + j ( U N d + 1 ( i ) ) I elim Δ h j i ,

where Δ J j i and Δ h j i represent a message that node j delivers to i. Then, the parameter { J ˆ i k ( k ) k ( N d + 1 ( i ) ) I left } related to the edge { ( i , k ) k ( N d + 1 ( i ) ) I left } is updated, namely,

(7) J ˆ i k = J i k + j ( U N d + 1 ( i ) ) I elim Δ J j i k ,

where Δ J j i k represents the message from j to edge (i, k).

  1. Propagate the exact message within the first d-order neighborhood of the variable x i .

    The message { Δ J i s , Δ h i s s ( N d ( i ) ) I leff } passed from variable x i to variable x s is computed, namely,

    (8) Δ J i s = J ˆ i s J ˆ i i 1 J ˆ i s Δ h i s = J ˆ i s J ˆ i i 1 h ˆ i .

    For s , t ( N d ( i ) ) I left , if edge ( s , t ) E , then edge (s, t) is added.

    The message passed by node i to edge (s, t) is computed as follows:

    (9) Δ J i s t = J ˆ i s i ˆ i i 1 J ˆ i t .

  2. Propagate partial message in the d + 1 order neighborhood of the variable x i .

u N n + 1 ( i ) I left, is a set, and the message { Δ J i u , Δ h i u u N n + 1 ( i ) I left } from node i to node u is calculated by:

(10) Δ J i u = J ˆ i u J ˆ i i 1 J ˆ i u Δ h i u = J ˆ i u f i i 1 h ˆ i .

v ( N d ( i ) ) I lett is set, and if ( u , v ) E , the message that node i passes to edge (u, v) is computed as follows:

(11) Δ J i u v = J ˆ i u J ˆ i i 1 J ˆ i v .

  1. Add node i to I elim and delete node i from the sequence I left .

The first-order neighborhood message propagation is carried out in the order from left to right and bottom to top on the two-dimensional lattice GGM of v, as presented in Figure 1. The message propagation process is shown in Figure 2. The first-order neighborhood message propagation process of node 13 is shown in Figure 2(a). The first-order neighborhood of node 13 is N 1 ( 13 ) = { 9 , 14 } . The dotted line represents the message propagation process, and the solid line (dark solid line) represents the new edge added when node 13 is eliminated. The first-order neighborhood message propagation processes of nodes 14 and 15 are shown in Figure 2(b) and (c), respectively. The first-order neighborhood message propagation process of all nodes from bottom to top is shown in Figure 2(d). Figure 2 depicts that the first-order neighborhood message propagation of the GGM only adds edges between the first-order neighborhood nodes of the eliminated variables in each variable elimination process, and the entire elimination process has only linear computational complexity.

Figure 2 
                  First-order neighborhood message propagation process of the GGM represented by a–d.
Figure 2

First-order neighborhood message propagation process of the GGM represented by a–d.

Furthermore, the second-order neighborhood message propagation is carried out in the order from left to right and bottom to top using the 4 × 4 two-dimensional lattice GGM. The message propagation process is shown in Figure 3.

Figure 3 
                  Second-order neighborhood message propagation process of the GGM.
Figure 3

Second-order neighborhood message propagation process of the GGM.

The variable first-order and second-order neighborhood message propagation processes are compared using node 15 as an example, as shown in Figure 3(c). The neighborhoods of node 15 are N 1 ( 15 ) = { 14 , 11 , 16 } , N 2 ( 15 ) = { 10 } , N 3 ( 15 ) = { 9 } , respectively. The first-order neighborhood message propagation of node 15 is to carry out accurate message propagation in the first-order neighborhood N 1 ( 15 ) = { 11 , 16 } , where node 14 has been eliminated, adding the new edges (11, 16), as shown in Figure 2(c). The second-order neighborhood message propagation of node 15 is accurate in the first-order and second-order neighborhoods N 1 N 2 = { 10 , 11 , 16 } , adding the new edges (10, 16) and (11, 16), as shown in Figure 3(c).

2.4 Gaussian MP-d algorithm

Gaussian d-order neighborhood message propagation (Gaussian MP-d) algorithm based on the GGM is a parallel message propagation algorithm using d-order neighborhood message propagation of variables, which can calculate the approximate value of the marginal probability distribution of the variable [18,19]. For GGMs, the variable elimination sequence I is chosen.

The first-order neighborhood message propagation is carried out in the reverse order from right to left and top to bottom based on the 4 × 4 two-dimensional lattice GMM as an example presented in Figure 1(a). The message propagation process is shown in Figure 4.

Figure 4 
                  First-order neighborhood message propagation process of the GGM in reverse order represented by a–d.
Figure 4

First-order neighborhood message propagation process of the GGM in reverse order represented by a–d.

Next, the approximate marginal probability distribution of the GGM is calculated using the parameter message sets in the forward and reverse orders. The local exponential parameters { J ˜ a 1 a 1 , h ˜ a 1 } for the variable x a x A are computed by:

(12) J ˜ a 1 a 1 = J a 1 a 1 + j N d + 1 ( i ) , j A Δ J j a 1 h ˜ a 1 = h a 1 + j N d + 1 ( i ) , j A Δ h j a 1 .

For ( a 1 , a 2 ) E , x a 1 , x a 2 x A , the exponential parameter J a 1 a 2 is calculated by:

(13) J ˜ a 1 a 2 = J a 1 a 2 + k N d + 1 ( a 1 ) , k N d + 1 ( a 2 ) , k A Δ J k a 1 a 2 .

The exponential parameters { J ˜ A , h ˜ A } of the marginal probability distribution of the variable set x A are denoted by:

(14) J ˜ A = J ˜ a 1 a 1 J ˜ a 1 a 2 J ˜ a 1 a | A | J ˜ a 2 a 1 J ˜ a 2 a 2 J ˜ a 2 a | A | J ˜ a | A | a 1 J ˜ a 2 a | A | J ˜ a | A | A h ˜ A = h ˜ a 1 h ˜ a 2 h ˜ a | | T .

Thus, the exponential parameters and their marginal probability distribution are derived using matrix and vector notations when summations are reorganized. The approximate marginal probability distribution of the subset x A is denoted by:

(15) p ˜ ( x A ) exp h ˜ A , x A + 1 2 J ˜ A , x A x A T .

The marginal probability distribution of variables x a 1 , x a 2 , , x a | | can be calculated by using standard Gaussian BP. The algorithm uses parametric messages under the first-order message propagation in the positive order and reverse order. The algorithm calculates the marginal probability distribution of variables x 5 , x 6 , x 7 , x 8 , and the messages in the positive and reverse order are shown in Figure 5. First, the local exponential parameters { J ˜ 55 , h ˜ 5 } of the univariate x 5 are computed by:

J ˜ 55 = J 55 + Δ J 1 5 + Δ J 9 5 + Δ J 10 5 h ˜ 5 = h 5 + Δ h 1 5 + Δ h 9 5 + Δ h 10 5 .

Figure 5 
                  Lower edge probability distribution of first-order neighborhood elimination of GGM.
Figure 5

Lower edge probability distribution of first-order neighborhood elimination of GGM.

Meanwhile, the exponential parameter J ˜ 56 of the edge ( x 5 , x 6 ) is expressed by:

J ˜ 56 = J 56 + Δ J 1 56 + Δ J 10 56 .

The exponential parameter of the marginal probability distribution of the variable set x A = { x 5 , x 6 , x 7 , x 8 } is represented by { J A , h ˜ A } , and the matrix and vector forma are given as follows:

J ˜ [ 5 , 6 , 7 , 8 } = J ˜ 55 J ˜ 56 0 0 J ˜ 56 J ˜ 66 J ˜ 67 0 0 J ˜ 76 J ˜ 77 J ˜ 78 0 0 J ˜ 87 J ˜ 88 , h ˜ { 5 , 6 , 7 , 8 } = h ˜ 5 h ˜ 6 h ˜ 7 h ˜ 8 .

3 Utilization of fuzzy hierarchical reasoning and scientific inversion parallel programming for the risk assessment of the computer network

The steps of the calculation are shown in Figure 6.

Figure 6 
               Flowchart of the scientific inversion parallel programming.
Figure 6

Flowchart of the scientific inversion parallel programming.

In addition, it is expected that even agents in different locations can communicate and cooperate in the same environment. The system assessing network security is shown in Figure 7.

Figure 7 
               Assessment framework of the network security.
Figure 7

Assessment framework of the network security.

From the perspective of multi-level distributed communication, the communication part of the security management and supervision system can be briefly described in Figure 8.

Figure 8 
               Overall architecture of the communication of the security management and monitoring system.
Figure 8

Overall architecture of the communication of the security management and monitoring system.

4 Results

After the construction of the fuzzy hierarchical reasoning model based on scientific inversion parallel programming to assess the risk of computer network information, the effect of the proposed model was verified. First, the inversion effect was verified, which was mainly carried out by expert evaluations whose scores are shown in Table 1.

Table 1

Verification of the effect of scientific inversion parallel programming

Num Inversion evaluation Num Inversion evaluation Num Inversion evaluation
1 75.22 18 69.86 35 70.78
2 74.23 19 68.88 36 74.91
3 77.28 20 71.86 37 69.93
4 76.03 21 76.10 38 71.62
5 69.39 22 69.91 39 75.17
6 70.11 23 69.37 40 69.41
7 70.34 24 76.35 41 74.79
8 77.68 25 73.03 42 75.90
9 69.17 26 72.35 43 73.15
10 70.07 27 72.73 44 74.82
11 72.89 28 69.41 45 77.28
12 69.27 29 77.29 46 70.63
13 69.45 30 74.50 47 77.13
14 73.11 31 76.56 48 70.71
15 69.83 32 75.00 49 72.90
16 69.80 33 68.69 50 75.77
17 67.79 34 69.47 51 71.89

The scientific inversion parallel programming had a better effect. Then, the fuzzy hierarchical inference model was used to assess the risk of computer network information using MATLAB 7.9. Table 2 presents the results.

Table 2

Verification of the effect of the fuzzy hierarchical reasoning model on the risk assessment of computer network information

Num Security assessment Num Security assessment Num Security assessment
1 84.66 18 81.99 35 90.76
2 78.13 19 79.43 36 90.73
3 83.75 20 90.27 37 90.44
4 80.12 21 80.98 38 80.53
5 84.31 22 80.05 39 83.93
6 86.01 23 89.66 40 84.73
7 85.49 24 78.44 41 86.47
8 80.66 25 86.97 42 90.63
9 87.11 26 87.13 43 86.73
10 87.29 27 87.68 44 80.78
11 80.32 28 83.86 45 80.97
12 90.61 29 81.28 46 89.43
13 83.17 30 85.76 47 80.38
14 79.01 31 89.70 48 90.97
15 89.56 32 90.49 49 86.56
16 90.92 33 87.37 50 86.89
17 89.30 34 89.21 51 82.96

The simulation showed that scientific inversion parallel programming could be used to assess the risk of computer network information and help effectively improve the security issue of computer network information.

5 Discussion

The aim of this study is to develop a method for quantifying the relative importance of the risk assessment selection criterion of computer networks. These variables were investigated, and the rearrangement and classification of them were validated. The relative importance of the variables was quantified. By applying the relative importance to the risk assessment, the control that has the higher priority to be implemented was identified by considering the relatively more important control parameters.

Even though the operating system of computer networks has the characteristics of openness and virtuality, both users and companies demand more secure computer networks and better-integrated information systems. In addition, several data are shared on networks since the computer network systems need to communicate. However, several types of intrusions are possible and could impact the effectiveness, security, and reliability of the computer operating system badly.

This article combines the fuzzy hierarchical reasoning model with scientific inversion parallel programming to study and assess the risk of computer networks and information integrity. However, the implementation of the fuzzy hierarchical reasoning model is based on expert evaluations and has a high level of subjective evaluation scores. So, when used, the result could contain some degree of bias. Thus, to overcome those, scalability issues are resolved by adopting a dynamic consistency-checking step.

Even agents in different locations communicate and cooperate in the same environment. From the perspective of multi-level distributed communication, the communication part of the security management and supervision system functions to construct data used by the fuzzy hierarchical reasoning model based on scientific inversion parallel programming, which conducts inversion mainly carried out by expert evaluations to assess the risk of computer network information.

The simulation shows that scientific inversion parallel programming could be used to assess the risk of computer network information and help effectively improve the security issue of computer network information.

Varying elimination sequences in the GGM have an impact on the results. The approximated variance will be changed when the elimination sequence is altered. Moreover, the inferred marginal probability distribution would have different parameters. These issues should be investigated in future research.

Acknowledgement

The author would like to thank the referees for very helpful comments that have led to an improvement of the article.

  1. Funding information: No funding was received for this study. The article is written by a single author.

  2. Conflict of interest: None.

  3. Data availability statement: The data could be shared upon request by sending an email to the corresponding author.

References

[1] Chegini M, Bernard J, Berger P, Sourin A, Andrews K, Schreck T. Interactive labeling of a multivariate dataset for supervised machine learning using linked visualizations, clustering, and active learning. Vis Inform. 2019;3(1):9–17.10.1016/j.visinf.2019.03.002Suche in Google Scholar

[2] Cheng L, Kovachki NB, Welborn M, Miller TF. Regression clustering for improved accuracy and training costs with molecular-orbital-based machine learning. J Chem Theory Comput. 2019;15(12):6668–77.10.1021/acs.jctc.9b00884Suche in Google Scholar PubMed

[3] Choo K-KR, Kermani MM, Azarderakhsh R, Govindarasu M. Emerging embedded and cyber-physical system security challenges and innovations. IEEE Trans Dependable Secure Comput. 2017;14(3):235–6.10.1109/TDSC.2017.2664183Suche in Google Scholar

[4] Cram WA, D’arcy J, Proudfoot JG. Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance. MIS Q. 2019;43(2):525–54.10.25300/MISQ/2019/15117Suche in Google Scholar

[5] Dotsenko S, Illiashenko O, Kamenskyi S, Kharchenko V. Integrated security management system for enterprises in industry 4.0. Inf Secur. 2019;43(3):294–304.10.11610/isij.4322Suche in Google Scholar

[6] Giacoumidis E, Matin A, Wei J, Doran NJ, Barry LP, Wang X. Blind nonlinearity equalization by machine-learning-based clustering for single-and multichannel coherent optical OFDM. J Light Technol. 2018;36(3):721–7.10.1109/JLT.2017.2778883Suche in Google Scholar

[7] Hani SU, Alam AT. Software development for information system-achieving optimum quality with security. Int J Inf Syst Model Des. 2017;8(4):1–20.10.4018/IJISMD.2017100101Suche in Google Scholar

[8] Kim NY, Rathore S, Ryu JH, Park JH, Park JH. A survey on cyber-physical system security for IoT: issues, challenges, threats, solutions. J Inf Process Syst. 2018;14(6):1361–84.Suche in Google Scholar

[9] Le VH, Phung VO, Nguyen NH. Information security risk management by a holistic approach: A Case study for Vietnamese e-government. IJCSNS Int J Comput Sci Netw Secur. 2020;20(6):72–82.Suche in Google Scholar

[10] Li D, Cai Z, Deng L, Yao X, Wang HH. The information security model of blockchain based on intrusion sensing in the IoT environment. Clust Comput. 2019;22(1):451–68.10.1007/s10586-018-2516-1Suche in Google Scholar

[11] Li H, Kafka OL, Gao J, Yu C, Nie Y, Zhang L, et al. Clustering discretization methods for generation of material performance databases in machine learning and design optimization. Comput Mech. 2019;64(2):281–305.10.1007/s00466-019-01716-0Suche in Google Scholar

[12] Lopez AB, Vatanparvar K, Nath APD, Young S, Bhunia S, Al Faruque MA. A security perspective on battery systems of the Internet of Things. J Hardw Syst Secur. 2017;1(2):188–99.10.1007/s41635-017-0007-0Suche in Google Scholar

[13] Mirmozaffari M, Boskabadi A, Azeem G, Massah R, Boskabadi E, Dolatsara EA, et al. Machine learning clustering algorithms based on the DEA optimization approach for banking systems in developing countries. Eur J Eng Res Sci. 2020;5(6):651–8.10.24018/ejers.2020.5.6.1924Suche in Google Scholar

[14] Mydhili SK, Periyanayagi S, Baskar S, Shakeel PM, Hariharan PH. Machine learning-based multi-scale parallel K-means++ clustering for cloud-assisted Internet of things. Peer-to-Peer Netw Appl. 2020;13(6):2023–35.10.1007/s12083-019-00800-9Suche in Google Scholar

[15] Safi A. Improving the security of the Internet of Things using encryption algorithms. Int J Comput Inf Eng. 2017;11(5):558–61.Suche in Google Scholar

[16] Sun M, Konstantelos I, Strbac G. A deep learning-based feature extraction framework for system security assessment. IEEE Trans Smart Grid. 2018;10(5):5007–20.10.1109/TSG.2018.2873001Suche in Google Scholar

[17] Tsoi KKF, Chan NB, Yiu KKL, Poon SKS, Lin B, Ho K. Machine learning clustering for blood pressure variability applied to Systolic Blood Pressure Intervention Trial (SPRINT) and the Hong Kong Community Cohort. Hypertension. 2020;76(2):569–76.10.1161/HYPERTENSIONAHA.119.14213Suche in Google Scholar PubMed

[18] Plarre KH, Kumar PR. Extended message passing algorithm for inference in loopy Gaussian graphical models. Ad Hoc Netw. 2004;2(2):153–69.10.1016/S1570-8705(03)00052-0Suche in Google Scholar

[19] Martínez CA, Khare K, Rahman S, Elzo MA. Modeling correlated marker effects in genome-wide prediction via Gaussian concentration graph models. J Theor Biol. 2018;437:67–78.10.1016/j.jtbi.2017.10.017Suche in Google Scholar PubMed

[20] Nielsen JD, Gámez JA, Salmerón A. Modelling and inference with Conditional Gaussian probabilistic decision graphs. Int J Approx Reason. 2012;53(7):929–45.10.1016/j.ijar.2011.09.005Suche in Google Scholar

Received: 2023-06-17
Revised: 2023-08-21
Accepted: 2023-10-10
Published Online: 2023-11-29

© 2023 the author(s), published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Artikel in diesem Heft

  1. Research Articles
  2. The regularization of spectral methods for hyperbolic Volterra integrodifferential equations with fractional power elliptic operator
  3. Analytical and numerical study for the generalized q-deformed sinh-Gordon equation
  4. Dynamics and attitude control of space-based synthetic aperture radar
  5. A new optimal multistep optimal homotopy asymptotic method to solve nonlinear system of two biological species
  6. Dynamical aspects of transient electro-osmotic flow of Burgers' fluid with zeta potential in cylindrical tube
  7. Self-optimization examination system based on improved particle swarm optimization
  8. Overlapping grid SQLM for third-grade modified nanofluid flow deformed by porous stretchable/shrinkable Riga plate
  9. Research on indoor localization algorithm based on time unsynchronization
  10. Performance evaluation and optimization of fixture adapter for oil drilling top drives
  11. Nonlinear adaptive sliding mode control with application to quadcopters
  12. Numerical simulation of Burgers’ equations via quartic HB-spline DQM
  13. Bond performance between recycled concrete and steel bar after high temperature
  14. Deformable Laplace transform and its applications
  15. A comparative study for the numerical approximation of 1D and 2D hyperbolic telegraph equations with UAT and UAH tension B-spline DQM
  16. Numerical approximations of CNLS equations via UAH tension B-spline DQM
  17. Nonlinear numerical simulation of bond performance between recycled concrete and corroded steel bars
  18. An iterative approach using Sawi transform for fractional telegraph equation in diversified dimensions
  19. Investigation of magnetized convection for second-grade nanofluids via Prabhakar differentiation
  20. Influence of the blade size on the dynamic characteristic damage identification of wind turbine blades
  21. Cilia and electroosmosis induced double diffusive transport of hybrid nanofluids through microchannel and entropy analysis
  22. Semi-analytical approximation of time-fractional telegraph equation via natural transform in Caputo derivative
  23. Analytical solutions of fractional couple stress fluid flow for an engineering problem
  24. Simulations of fractional time-derivative against proportional time-delay for solving and investigating the generalized perturbed-KdV equation
  25. Pricing weather derivatives in an uncertain environment
  26. Variational principles for a double Rayleigh beam system undergoing vibrations and connected by a nonlinear Winkler–Pasternak elastic layer
  27. Novel soliton structures of truncated M-fractional (4+1)-dim Fokas wave model
  28. Safety decision analysis of collapse accident based on “accident tree–analytic hierarchy process”
  29. Derivation of septic B-spline function in n-dimensional to solve n-dimensional partial differential equations
  30. Development of a gray box system identification model to estimate the parameters affecting traffic accidents
  31. Homotopy analysis method for discrete quasi-reversibility mollification method of nonhomogeneous backward heat conduction problem
  32. New kink-periodic and convex–concave-periodic solutions to the modified regularized long wave equation by means of modified rational trigonometric–hyperbolic functions
  33. Explicit Chebyshev Petrov–Galerkin scheme for time-fractional fourth-order uniform Euler–Bernoulli pinned–pinned beam equation
  34. NASA DART mission: A preliminary mathematical dynamical model and its nonlinear circuit emulation
  35. Nonlinear dynamic responses of ballasted railway tracks using concrete sleepers incorporated with reinforced fibres and pre-treated crumb rubber
  36. Two-component excitation governance of giant wave clusters with the partially nonlocal nonlinearity
  37. Bifurcation analysis and control of the valve-controlled hydraulic cylinder system
  38. Engineering fault intelligent monitoring system based on Internet of Things and GIS
  39. Traveling wave solutions of the generalized scale-invariant analog of the KdV equation by tanh–coth method
  40. Electric vehicle wireless charging system for the foreign object detection with the inducted coil with magnetic field variation
  41. Dynamical structures of wave front to the fractional generalized equal width-Burgers model via two analytic schemes: Effects of parameters and fractionality
  42. Theoretical and numerical analysis of nonlinear Boussinesq equation under fractal fractional derivative
  43. Research on the artificial control method of the gas nuclei spectrum in the small-scale experimental pool under atmospheric pressure
  44. Mathematical analysis of the transmission dynamics of viral infection with effective control policies via fractional derivative
  45. On duality principles and related convex dual formulations suitable for local and global non-convex variational optimization
  46. Study on the breaking characteristics of glass-like brittle materials
  47. The construction and development of economic education model in universities based on the spatial Durbin model
  48. Homoclinic breather, periodic wave, lump solution, and M-shaped rational solutions for cold bosonic atoms in a zig-zag optical lattice
  49. Fractional insights into Zika virus transmission: Exploring preventive measures from a dynamical perspective
  50. Rapid Communication
  51. Influence of joint flexibility on buckling analysis of free–free beams
  52. Special Issue: Recent trends and emergence of technology in nonlinear engineering and its applications - Part II
  53. Research on optimization of crane fault predictive control system based on data mining
  54. Nonlinear computer image scene and target information extraction based on big data technology
  55. Nonlinear analysis and processing of software development data under Internet of things monitoring system
  56. Nonlinear remote monitoring system of manipulator based on network communication technology
  57. Nonlinear bridge deflection monitoring and prediction system based on network communication
  58. Cross-modal multi-label image classification modeling and recognition based on nonlinear
  59. Application of nonlinear clustering optimization algorithm in web data mining of cloud computing
  60. Optimization of information acquisition security of broadband carrier communication based on linear equation
  61. A review of tiger conservation studies using nonlinear trajectory: A telemetry data approach
  62. Multiwireless sensors for electrical measurement based on nonlinear improved data fusion algorithm
  63. Realization of optimization design of electromechanical integration PLC program system based on 3D model
  64. Research on nonlinear tracking and evaluation of sports 3D vision action
  65. Analysis of bridge vibration response for identification of bridge damage using BP neural network
  66. Numerical analysis of vibration response of elastic tube bundle of heat exchanger based on fluid structure coupling analysis
  67. Establishment of nonlinear network security situational awareness model based on random forest under the background of big data
  68. Research and implementation of non-linear management and monitoring system for classified information network
  69. Study of time-fractional delayed differential equations via new integral transform-based variation iteration technique
  70. Exhaustive study on post effect processing of 3D image based on nonlinear digital watermarking algorithm
  71. A versatile dynamic noise control framework based on computer simulation and modeling
  72. A novel hybrid ensemble convolutional neural network for face recognition by optimizing hyperparameters
  73. Numerical analysis of uneven settlement of highway subgrade based on nonlinear algorithm
  74. Experimental design and data analysis and optimization of mechanical condition diagnosis for transformer sets
  75. Special Issue: Reliable and Robust Fuzzy Logic Control System for Industry 4.0
  76. Framework for identifying network attacks through packet inspection using machine learning
  77. Convolutional neural network for UAV image processing and navigation in tree plantations based on deep learning
  78. Analysis of multimedia technology and mobile learning in English teaching in colleges and universities
  79. A deep learning-based mathematical modeling strategy for classifying musical genres in musical industry
  80. An effective framework to improve the managerial activities in global software development
  81. Simulation of three-dimensional temperature field in high-frequency welding based on nonlinear finite element method
  82. Multi-objective optimization model of transmission error of nonlinear dynamic load of double helical gears
  83. Fault diagnosis of electrical equipment based on virtual simulation technology
  84. Application of fractional-order nonlinear equations in coordinated control of multi-agent systems
  85. Research on railroad locomotive driving safety assistance technology based on electromechanical coupling analysis
  86. Risk assessment of computer network information using a proposed approach: Fuzzy hierarchical reasoning model based on scientific inversion parallel programming
  87. Special Issue: Dynamic Engineering and Control Methods for the Nonlinear Systems - Part I
  88. The application of iterative hard threshold algorithm based on nonlinear optimal compression sensing and electronic information technology in the field of automatic control
  89. Equilibrium stability of dynamic duopoly Cournot game under heterogeneous strategies, asymmetric information, and one-way R&D spillovers
  90. Mathematical prediction model construction of network packet loss rate and nonlinear mapping user experience under the Internet of Things
  91. Target recognition and detection system based on sensor and nonlinear machine vision fusion
  92. Risk analysis of bridge ship collision based on AIS data model and nonlinear finite element
  93. Video face target detection and tracking algorithm based on nonlinear sequence Monte Carlo filtering technique
  94. Adaptive fuzzy extended state observer for a class of nonlinear systems with output constraint
Heruntergeladen am 5.11.2025 von https://www.degruyterbrill.com/document/doi/10.1515/nleng-2022-0346/html
Button zum nach oben scrollen