Simulation and Optimization to the Information Security Management Measure Based on the Parallel Control

Article Preview

Abstract:

To improve the effectiveness of management measure for the information security, the parallel control approach is employed to the optimization of information security management measure. The simulation software Extend is applied to build the artificial system of information security management system, and the information security management measure is evaluated via the artificial system. A parallel control system is applied to achieve the interaction between the true system and the artificial system to minimize their difference. The computational experiment method is used to continuously adjust the information security management measure, and obtains the satisfied information security management measure finally. Take the public Internet network management as example to illustrate this method can achieve the real-time simulation, evaluation and optimization of information security management measure.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 225-226)

Pages:

585-588

Citation:

Online since:

April 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] V. S. Subrahmanian, M. Albanese, M. V. Martinez, et al. CARA: A Cultural- Reasoning Architecture [J]. IEEE Intelligent Systems, 2007, 22(2): 12-16.

DOI: 10.1109/mis.2007.25

Google Scholar

[2] V. S. Subrahmanian. Computer Science: Cultural Modeling in Real Time [J]. Science, 2007, 317(5844): 1509-1510.

DOI: 10.1126/science.1148306

Google Scholar

[3] V. Martinez, G. I. Simari, A. Sliva, et al. CONVEX: Similarity-Based Algorithms for Forecasting Group Behavior [J]. IEEE Intelligent Systems, 2008, 23(4): 51-57.

DOI: 10.1109/mis.2008.62

Google Scholar

[4] W. Zhang, Y. Zhang, X. Xiong, et al. BSV Investors Versus Rational Investors: an Agent-based Computational Finance Model [J]. International Journal of Information Technology & Decision Making, 2006, 5(3): 455-466.

DOI: 10.1142/s0219622006002052

Google Scholar

[5] Y. Zhang and W. Zhang. Can Irrational Investor Survive, a Social-Computing Perspective [J]. IEEE Intelligent Systems, 2007, 22(5): 58-64.

DOI: 10.1109/mis.2007.4338495

Google Scholar