Financial Risk Assessment Model Based on Fuzzy Logic

Main Article Content

Xiuqiong Yang

Abstract

In the rapidly evolving landscape of business operations, establishing a robust security domain prevention system in the Middle Office is of utmost importance. To achieve this, the integration of Choquet expectation-based methodologies offers a powerful approach. The Middle Office acts as a critical hub for various business processes, including risk management, compliance, and data protection. With the implementation of Choquet expectation theory, which encompasses the combination of multiple criteria and preferences, businesses can effectively assess and optimize their security domain prevention system. The establishment and optimization of a security domain prevention system based on Choquet’s expectations provide businesses with a comprehensive and tailored approach to protect their critical assets, maintain operational continuity, and safeguard sensitive data from emerging threats in the Middle Office environment. This paper constructed a Fuzzy Optimization Membership Estimation (FOME) for the computation of the feature vector. The proposed FOME model uses the Flemingo Optimization model for the evaluation of the feature vector in the business middle office. The FOME model effectively computes the Choquet expectation features for the analysis of the risk management of the feature vector in the middle office. Through the membership estimation with the FOME model, the model significantly computes the different attacks in the middle office. The analysis of the proposed FOME is evaluated for the conventional CICIDS dataset for the attack analysis. The simulation analysis stated that the proposed FOME model achieves a higher classification accuracy of 99.89% for attack detection.

Article Details

Section
Articles
Author Biography

Xiuqiong Yang

1Xiuqiong Yang

1Accounting College, Chongqing College of Finance and Economics, China,402160

*Corresponding author's e-mail: yxq626586@sina.com

Copyright © JES 2024 on-line : journal.esrgroups.org

References

Colabianchi, S., Costantino, F., Di Gravio, G., Nonino, F., & Patriarca, R. (2021). Discussing resilience in the context of cyber physical systems. Computers & Industrial Engineering, 160, 107534.

Bag, S., Telukdarie, A., Pretorius, J. C., & Gupta, S. (2021). Industry 4.0 and supply chain sustainability: framework and future research directions. Benchmarking: An International Journal, 28(5), 1410-1450.

Fan, W., Song, J., Chen, L., & Shi, J. (2022). Intelligent performance evaluation of urban subway PPP project based on deep neural network model. Computational intelligence and neuroscience, 2022.

Alswailem, O. A., Horanieh, B. K., AlAbbad, A., AlMuhaideb, S., AlMuhanna, A., AlQuaid, M., ... & AbuSalah, A. (2021). COVID-19 Intelligence-Driven Operational Response Platform: Experience of a Large Tertiary Multihospital System in the Middle East. Diagnostics, 11(12), 2283.

Mohammed, Z. K., Zaidan, A. A., Aris, H. B., Alsattar, H. A., Qahtan, S., Deveci, M., & Delen, D. (2023). Bitcoin network-based anonymity and privacy model for metaverse implementation in Industry 5.0 using linear Diophantine fuzzy sets. Annals of Operations Research, 1-41.

Kandaperumal, G. (2021). Resilience-Driven Situational Awareness and Decision Support for Cyber-Power Distribution Systems. Washington State University,1-24.

Sonje, S. A., Pawar, R. S., & Shukla, S. (2021). Assessing blockchain-based innovation for the “Right to Education” using MCDA approach of value-focused thinking and fuzzy cognitive maps. IEEE Transactions on Engineering Management.

Lin, J., Jianjun, Z., & Nanehkaran, Y. A. (2022). A study on bilateral matching of team-science talents in new R&D institutions based on grey correlation-cloud model. Journal of Intelligent & Fuzzy Systems, 43(1), 813-840.

Alzahrani, F. A. (2021). Estimating Security Risk of Healthcare Web Applications: A Design Perspective. Computers, Materials & Continua, 67(1).

Omidzadeh, D., Sajadi, S. M., & Bozorgi Amiri, A. Development the New Attributes of the Product Design Target Book Based on Sustainability Pillars-(a Hybrid Fuzzy Dematel and Fuzzy Anp Techniques). Available at SSRN 4224913.

Ahmed, N. N., & Nanath, K. (2021). Exploring cybersecurity ecosystem in the Middle East: towards an SME recommender system. Journal of Cyber Security and Mobility, 511-536.

Al-Matari, O. M., Helal, I. M., Mazen, S. A., & Elhennawy, S. (2021). Adopting security maturity model to the organizations’ capability model. Egyptian Informatics Journal, 22(2), 193-199.

Georgiadou, A., Mouzakitis, S., & Askounis, D. (2022). Detecting insider threat via a cyber-security culture framework. Journal of Computer Information Systems, 62(4), 706-716.

Alzoubi, Y. I., Osmanaj, V. H., Jaradat, A., & Al‐Ahmad, A. (2021). Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art. Security and Privacy, 4(2), 145.

Dai, D., & Boroomand, S. (2021). A review of artificial intelligence to enhance the security of big data systems: state-of-art, methodologies, applications, and challenges. Archives of Computational Methods in Engineering, 1-19.

Sarker, I. H., Furhad, M. H., & Nowrozy, R. (2021). Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science, 2, 1-18.

Jayalaxmi, P., Saha, R., Kumar, G., Kumar, N., & Kim, T. H. (2021). A taxonomy of security issues in Industrial Internet-of-Things: scoping review for existing solutions, future implications, and research challenges. IEEE Access, 9, 25344-25359.

Awaysheh, F. M., Aladwan, M. N., Alazab, M., Alawadi, S., Cabaleiro, J. C., & Pena, T. F. (2021). Security by design for big data frameworks over cloud computing. IEEE Transactions on Engineering Management, 69(6), 3676-3693.

Kuamr, S., Yadav, R., Kaushik, P., Babu, S. B. G., Dubey, R. K., & Subramanian, M. (2022). Effective cyber security using IoT to prevent E-threats and hacking during covid-19.

Wichary, T., Mongay Batalla, J., Mavromoustakis, C. X., Żurek, J., & Mastorakis, G. (2022). Network slicing security controls and assurance for verticals. Electronics, 11(2), 222.

Kaur, J., & Ramkumar, K. R. (2022). The recent trends in cyber security: A review. Journal of King Saud University-Computer and Information Sciences, 34(8), 5766-5781.

Hasan, M. K., Ghazal, T. M., Saeed, R. A., Pandey, B., Gohel, H., Eshmawi, A. A., ... & Alkhassawneh, H. M. (2022). A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things. IET Communications, 16(5), 421-432.

Ali, A., Septyanto, A. W., Chaudhary, I., Al Hamadi, H., Alzoubi, H. M., & Khan, Z. F. (2022, February). Applied Artificial Intelligence as Event Horizon Of Cyber Security. In 2022 International Conference on Business Analytics for Technology and Security (ICBATS) (pp. 1-7). IEEE.

Jangjou, M., & Sohrabi, M. K. (2022). A comprehensive survey on security challenges in different network layers in cloud computing. Archives of Computational Methods in Engineering, 29(6), 3587-3608.

Haque, M. A., Shetty, S., Gold, K., & Krishnappa, B. (2021). Realizing cyber-physical systems resilience frameworks and security practices. Security in Cyber-Physical Systems: Foundations and Applications, 1-37.