Welcome to Francis Academic Press

Academic Journal of Engineering and Technology Science, 2024, 7(2); doi: 10.25236/AJETS.2024.070207.

The Belief Rule Base in Network Security: Construction and Management

Author(s)

Feng Wen

Corresponding Author:
Feng Wen
Affiliation(s)

School of Intelligence Science and Engineering, Xi'an Peihua University, Xi'an, 710125, China

Abstract

The belief rule base (BRB) serves as a robust framework for constructing and managing decision-making systems within network security, accommodating the inherent uncertainty and imprecision prevalent in such environments. This study delves into the integration of uncertainty and imprecision in BRB construction, highlighting strategies for managing the BRB throughout its lifecycle. The management of the BRB encompasses maintenance and update strategies, addressing the dynamic nature of network environments. Techniques for handling dynamic network environments, monitoring and evaluating BRB performance, and incorporating feedback mechanisms for continuous improvement are explored. These management strategies ensure the efficacy and relevance of the BRB in detecting and mitigating the possible evolving security threats.

Keywords

Belief rule base, Network security, Maintenance strategies, Dynamic environments, Performance monitoring, Feedback mechanisms, Continuous improvement

Cite This Paper

Feng Wen. The Belief Rule Base in Network Security: Construction and Management. Academic Journal of Engineering and Technology Science (2024) Vol. 7, Issue 2: 39-44. https://doi.org/10.25236/AJETS.2024.070207.

References

[1] Zhou, Z. J., Hu, G. Y., Zhang, B. C., Hu, C. H., Zhou, Z. G., & Qiao, P. L. (2017). A model for hidden behavior prediction of complex systems based on belief rule base and power set. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 48(9), 1649-1655.

[2] Anderson, C., Baskerville, R. L., & Kaul, M. (2017). Information security control theory: Achieving a sustainable reconciliation between sharing and protecting the privacy of information. Journal of Management Information Systems, 34(4), 1082-1112.

[3] Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., & Xu, M. (2020). A survey on machine learning techniques for cyber security in the last decade. IEEE access, 8, 222310-222354.

[4] Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97.

[5] Chen, D., Wawrzynski, P., & Lv, Z. (2021). Cyber security in smart cities: a review of deep learning-based applications and case studies. Sustainable Cities and Society, 66, 102655.

[6] Gunes, B., Kayisoglu, G., & Bolat, P. (2021). Cyber security risk assessment for seaports: A case study of a container port. Computers & Security, 103, 102196.

[7] Caiado, R. G. G., Scavarda, L. F., Gavião, L. O., Ivson, P., de Mattos Nascimento, D. L., & Garza-Reyes, J. A. (2021). A fuzzy rule-based industry 4.0 maturity model for operations and supply chain management. International Journal of Production Economics, 231, 107883.

[8] Pan, Y., & Zhang, L. (2021). Roles of artificial intelligence in construction engineering and management: A critical review and future trends. Automation in Construction, 122, 103517.