Application of ID3 Algorithm in Information Asset Identification
Authors
Yong Hua, Yunlong Zhang
Corresponding Author
Yong Hua
Available Online November 2012.
- DOI
- 10.2991/citcs.2012.38How to use a DOI?
- Keywords
- information Security; decision tree; ID3 algorithm
- Abstract
In the issue of information security risk evaluation, the asset, the threat and the vulnerability are the three most important elements. Information asset identification is a primary link of information security risk evaluation process. In this paper, the decision tree algorithm was applied into the identification of information assets; the basic process of ID3 algorithm are described; the data of information system property is classified by ID3 algorithm; the decision tree was made; and the rules are extracted for providing basis of information asset recognition.
- Copyright
- © 2012, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Yong Hua AU - Yunlong Zhang PY - 2012/11 DA - 2012/11 TI - Application of ID3 Algorithm in Information Asset Identification BT - Proceedings of the 2012 National Conference on Information Technology and Computer Science PB - Atlantis Press SP - 138 EP - 140 SN - 1951-6851 UR - https://doi.org/10.2991/citcs.2012.38 DO - 10.2991/citcs.2012.38 ID - Hua2012/11 ER -