Main Article Content

Al-Khawaldeh Igried
Al -Smadi Takialddin
Al-Khawaldeh Bashar Igried


Abstract

Information security risk analysis has increased the number of complex issues of information security, requiring the participation of specialists in different areas of knowledge. This leads to inability of such systems to evaluate the security state of computer system thoroughly.Present paper on the intellectual to risk analysis and vulnerability of information systems. The aim of the study is to eliminate subjectivity in the assessment of risks and reduction of time for the process of risk analysis and vulnerability of the computer system. The mathematical tools of artificial neural network and probabilistic attack tree were used in the research. In order to evaluate the efficiency of the developed system, the security assessment for the Windows systems was performed. As the result the conformity between the real security of the information system and the assigned evaluations was proved.


© 2018 JASET, International Scholars and Researchers Association

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
1.
Igried A-K, Takialddin A-S, Bashar Igried A-K, khalid AS. Risk and Vulnerability Analyses for the protection of Information for Future communication security Based Neural Networks. j. adv. sci. eng. technol. [Internet]. 2021 Dec. 26 [cited 2024 Apr. 23];2(1):31-9. Available from: https://www.isnra.net/index.php/jaset/article/view/39
Section
Articles

References

. Al Smadi Takialddin, K. A. S., & Orayb, O. AL-Smadi, High-Speed for Data Transmission in GSM Networks Based on Cognitive Radio. American Journal of Engineering and Applied Sciences, 10(1), 69-77. DOI: https://doi.org/10.3844/ajeassp.2017.69.77

.Camtepe S. A., Yener B. A Formal Method for Attack Modeling and Detection // TR-06-01, Rensselaer Polytechnic Institute, Computer Science Department. 2006. URL: http://citeseer.ist.psu.edu/751069.html (15.03.2012).

.Sheyner O., Haines J., Jha S., Lippmann R., Wing J. M. Automated Generation and Analysis of Attack Graphs // Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, USA, 2002. P. 273–284.

. Ghaidan, K. A., Al Smadi, T. A., Aljumailly, T. A., & Al-Taweel, F. M. (2011). Development of a new approach for transmitting Digital message on a Frequency Limited Communication Channel transmission. Journal of Advanced Computer Science and Technology Research, 1, 52-62.

Hussein, A. L., Trad, E., & Al Smadi, T. (2018). Proactive algorithm dynamic mobile structure of Routing protocols of ad hoc networks. IJCSNS, 18(10), 86.

.Xiao M, Fan S. X, Wu Z. (2009), ―A threat-centric model for information security risk assessment, Journal of Wuhan University of Technology, Vol. 31, No. 18, pp. 43-45.

. Yang Y, Yao S. Z.(2009), ―Risk assessment method of information security based on threat analysis‖.Computer Engineering and Applications, Vol. 45, No. 3, pp. 94-96.

.Yazar Z. A (2011), Qualitative risk analysis and management tool – CRAMM, SANS Institute InfoSec Reading Room. 2011.

Al-Sawalha, A., & Al Smadi, T. (2018). Microstrip Patch Antenna Radiation Variation of Quality Factors and Bandwidth of a Conically Depressed. Journal of Advanced Sciences and Engineering Technologies, 1(1), 7. DOI: https://doi.org/10.32441/jaset.v1i1.53

.Zhang X, Huang Z, Wei G., Zhang X.(2010), ―Information security risk assessment methodologyresearch: Group decision making and analytic hierarchy process‖. In the Proceeding of IEEE the 2ndWorld Congress on Software Engineering, pp.157-60.

.I. Trrad, T. A. Smadi, and H. Al_Wahshat, “Application of Fuzzy Logic to Cognitive Wireless Communications,” International Journal of Recent Technology and Engineering (IJRTE), vol. 8, no. 3. Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP, pp. 2228–2234, Sep. 30, 2019. doi: 10.35940/ijrte.b2065.098319. DOI: https://doi.org/10.35940/ijrte.B2065.098319

.Kijo, H. and Luo, J. (2012), ― Analysis on the competitiveness of Chinese steel and the southKorean‖, Software Computing in Information Communication Technology, Vol. 2, No. 1, pp. 451460.

.Manadhata, P. K., Karabulat, Y., & Wing, J. M. (n.d.). Report: Measuring the attack surfaces of enterprise software. Retrieved December 29, 2011, from Carnegie Mellon: School of Computer Science.

. Al Smadi Takialddin, O. I. A., & Agha, K. A. A. (2018). Overview of Model Free Adaptive (MFA) Control Technology. DOI: https://doi.org/10.11591/ijai.v7.i4.pp165-169