Proceedings of the 2012 National Conference on Information Technology and Computer Science

Application of ID3 Algorithm in Information Asset Identification

Authors
Yong Hua, Yunlong Zhang
Corresponding Author
Yong Hua
Available Online November 2012.
DOI
https://doi.org/10.2991/citcs.2012.38How to use a DOI?
Keywords
information Security; decision tree; ID3 algorithm
Abstract
In the issue of information security risk evaluation, the asset, the threat and the vulnerability are the three most important elements. Information asset identification is a primary link of information security risk evaluation process. In this paper, the decision tree algorithm was applied into the identification of information assets; the basic process of ID3 algorithm are described; the data of information system property is classified by ID3 algorithm; the decision tree was made; and the rules are extracted for providing basis of information asset recognition.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
2012 National Conference on Information Technology and Computer Science
Part of series
Advances in Intelligent Systems Research
Publication Date
November 2012
ISBN
978-94-91216-39-8
ISSN
1951-6851
DOI
https://doi.org/10.2991/citcs.2012.38How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Yong Hua
AU  - Yunlong Zhang
PY  - 2012/11
DA  - 2012/11
TI  - Application of ID3 Algorithm in Information Asset Identification
BT  - 2012 National Conference on Information Technology and Computer Science
PB  - Atlantis Press
SP  - 138
EP  - 140
SN  - 1951-6851
UR  - https://doi.org/10.2991/citcs.2012.38
DO  - https://doi.org/10.2991/citcs.2012.38
ID  - Hua2012/11
ER  -