Browse > Article
http://dx.doi.org/10.5351/KJAS.2016.29.7.1173

Developing the information security risk index using network gathering data  

Park, Jin Woo (Department of Applied Statistics, University of Suwon)
Yun, Seokhoon (Department of Applied Statistics, University of Suwon)
Kim, Jinheum (Department of Applied Statistics, University of Suwon)
Jeong, Hyeong Chul (Department of Applied Statistics, University of Suwon)
Publication Information
The Korean Journal of Applied Statistics / v.29, no.7, 2016 , pp. 1173-1183 More about this Journal
Abstract
In this paper, we proposed an information security risk index to diagnose users' malware infection situations (such as computer virus and adware) by gathering data from KT network systems. To develop the information security risk index, we used the analytic hierarchy process methodology and estimated the risk weights of malware code types using the judgments of experts. The control chart could be used effectively to forecast the information security risk for the proposed information security risk index data.
Keywords
malware; analytic hierarchy process; information security risk index; control chart;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Choi, H. Y. and Jeong, H. C. (2015). Multivariate time series modeling for information security data, Journal of the Korean Data Analysis Society, 17, 1309-1318.
2 Jeong, H. C. (2010). Study on AHP and non-parametric verification on the importance of the diagnosis indicators of personal information security level, Journal of the Korean Data Analysis Society, 12, 1499-1510.
3 Jeong, H. C. (2012). A study on Korea domain registration forecasting, Journal of the Korean Data Analysis Society, 14, 1889-1898.
4 Jeong, H. C. (2013). A development of spam score card using the data mining method, Journal of the Korean Data Analysis Society, 15, 697-707.
5 Jeong, H. C., Lee, J. C., and Jhun, M. (2012). A study for obtaining weights in pairwise comparison matrix in AHP, The Korean Journal of Applied Statistics, 25, 531-541.   DOI
6 Lee, J. C., Jhun, M., and Jeong, H. C. (2014). A statistical testing of the consistency index in analytic hierarchy process, The Korean Journal of Applied Statistics, 27, 103-114.   DOI
7 KISA (2010). The Study on the Public Publication Promotion related to the Information Security, Korea Internet & Security Agency.
8 KISA (2011). Survey for Information Security Industry in Korea, Korea Internet & Security Agency.
9 KISA (2012). Internet Security Focus, Statistics, Korea Internet & Security Agency, Available from: http://www.kisa.or.kr/public/library/
10 Saaty, T. L. (2003). Decision-making with the AHP: Why is the principle eigenvector necessary, European Journal of Operational Research, 145, 85-91.   DOI
11 Saaty, T. L. (1980). The Analytic Hierarchy Process, McGraw-Hill, New York.
12 Venables, W. N., Smith, D. M., and The R Development Core Team (2010). An Introduction to R, Available from: http://cran.r-project.org/