Network security risk assessment based on fuzzy logic approach / Nurulhidayah Abdul Latif

Abdul Latif, Nurulhidayah (2012) Network security risk assessment based on fuzzy logic approach / Nurulhidayah Abdul Latif. Masters thesis, Universiti Teknologi MARA.

Abstract

The purposes of the study were to design a model of network security risk assessment and to assess the result from the risk assessment conducted. The threats created were dealing with the computer network which is spreading widely that might cause risk impact to the organization. Due to this condition, the security mechanism of an institution needs to determine that all the assets and information are preserving safely. Therefore, this research is focusing on risk assessment to analyze the generic threats in the education institution towards network security appliance which is called firewall. The generic threats list was chosen based on MyRAM (2005) guideline from Malaysian Administrative Modernization and Management Planning Unit (MAMPU). The qualitative method that leads to the understanding and holistic description of a phenomenon was applied in this study. This method generates rich, detail data from a multiple perspectives. The instruments used to collect data were close-ended questionnaire and interview. Questionnaire as the main source of information helped to obtain the evaluation of threats from the four experts in the network security area. In the interview session it was conducted face-to-face at the institution for a better understanding. Fuzzy Logic approach which contains Triangular Average Formula, Efficient Fuzzy Weighted Average (EFWA) and Euclidean Distance was selected as the approach in the present study. It was utilized in finding the 'Likelihood' and 'Consequence' of the threats. The result of this study revealed that firewall as the appliance was in the moderate level in which necessary measures should be taken by the particular institution to curb the threats. Risk assessment for the firewall will be conducted by using different approaches such as Bayesian, Dempster-Shafer Theory, Neural Network and Immunity Algorithm by utilizing more respondents in the future research.

Metadata

Item Type: Thesis (Masters)
Creators:
Creators
Email / ID Num.
Abdul Latif, Nurulhidayah
2010726461
Contributors:
Contribution
Name
Email / ID Num.
Thesis advisor
Mohd Ali, Fakariah Hani (Dr.)
UNSPECIFIED
Subjects: A General Works > Indexes (General)
Q Science > QA Mathematics > Fuzzy logic
T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunication > Computer networks. General works. Traffic monitoring > Intrusion detection systems (Computer security). Computer network security. Hackers
Divisions: Universiti Teknologi MARA, Shah Alam > Faculty of Computer and Mathematical Sciences
Programme: Master of Science (Information Technology)
Keywords: Network, security, computer
Date: July 2012
URI: https://ir.uitm.edu.my/id/eprint/63791
Edit Item
Edit Item

Download

[thumbnail of 63791.pdf] Text
63791.pdf

Download (155kB)

Digital Copy

Digital (fulltext) is available at:

Physical Copy

Physical status and holdings:
Item Status:
On Shelf

ID Number

63791

Indexing

Statistic

Statistic details