An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method

Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.

[1]  Komang Rinartha,et al.  Comparative study for better result on query suggestion of article searching with MySQL pattern matching and Jaccard similarity , 2017, 2017 5th International Conference on Cyber and IT Service Management (CITSM).

[2]  Adhistya Erna Permanasari,et al.  Automated Short Answer Scoring using Weighted Cosine Coefficient , 2016, 2016 IEEE Conference on e-Learning, e-Management and e-Services (IC3e).

[3]  Santosh K Pandey,et al.  A Comparative Study of Risk Assessment Methodologies for Information Systems , 2012 .

[4]  Barbara Hauer,et al.  Data and Information Leakage Prevention Within the Scope of Information Security , 2015, IEEE Access.

[5]  Julio Santisteban,et al.  Unilateral Weighted Jaccard Coefficient for NLP , 2015, 2015 Fourteenth Mexican International Conference on Artificial Intelligence (MICAI).

[6]  Youness Madani,et al.  An Approach of Semantic Similarity Measure between Documents Based on Big Data , 2016 .

[7]  Qingchao Yang,et al.  Relevant Words Extraction Method in Text Mining , 2013 .

[8]  Lior Rokach,et al.  Data Leakage Detection/Prevention Solutions , 2012 .

[9]  Subburaj Ramasamy,et al.  Context Based Classification of Reviews Using Association Rule Mining, Fuzzy Logics and Ontology , 2017 .

[10]  Gunnar Ellingsena,et al.  CENTERIS 2014-Conference on ENTERprise Information Systems / ProjMAN 2014-International Conference on Project MANagement / HCIST 2014-International Conference on Health and Social Care Information Systems and Technologies Internet of Things and Smart Objects for MHealth Monitoring and Control , 2014 .

[11]  Kornelije Rabuzin,et al.  HOW TO CALCULATE INFORMATION VALUE FOR EFFECTIVE SECURITY RISK ASSESSMENT , 2006 .

[12]  Daniel Dajun Zeng,et al.  Mapping users across social media platforms by integrating text and structure information , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).

[13]  Shuai Wang,et al.  Combination of VSM and Jaccard coefficient for external plagiarism detection , 2013, 2013 International Conference on Machine Learning and Cybernetics.

[14]  Bernhard Ager,et al.  Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic? , 2015, IEEE Security & Privacy.

[15]  Wenxian Xiao,et al.  Information Security Risk Assessment Based on Information Measure and Fuzzy Clustering , 2011, J. Softw..

[16]  Kwangho Song,et al.  An Improvement of Plagiarized Area Detection System Using Jaccard Correlation Coefficient Distance Algorithm , 2015 .