Fuzzy risk analysis of computer security threats

被引:0
|
作者
Yu, Yingbing [1 ]
Shindhelm, Art [1 ]
机构
[1] Western Kentucky Univ, Dept Comp Sci, Bowling Green, KY 42101 USA
关键词
fuzzy risk; masquerader detection; anomaly intrusion detection; computer immunology;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, security problems continue. to receive increasing coverage in both the popular and technical media. A large part of the problem is that current techniques are external, and not internal. The Computer immunology model based on finite automaton technique can be used to detect anomaly intrusions from masqueraders. A key mechanism in this immunity process is the ability to distinguish between self (i.e. normal organisms or behaviors) and non-self (i.e. abnormal or anomalous behavior). Based on the model, the paper further presents a novel fuzzy risk analysis approach to evaluate the threat as linguistic terms. The fuzzy threat output and some linguistic terms denoting threat levels are converted into generalized fuzzy numbers. A linguistic term that has the highest similarity with the output is selected as the overall threat. The experiment of masquerader detection conducted in a real environment show the very promising results with a high detection rate and a very low false alarm rate.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] COMPUTER THREATS AND INFORMATION SECURITY
    Tarazona T, Cesar H.
    [J]. DERECHO PENAL Y CRIMINOLOGIA, 2007, 28 (84): : 137 - 146
  • [2] Game Theoretic Risk Analysis of Security Threats
    Li, J.
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2010, 61 (12) : 1795 - 1795
  • [3] COMPUTER SECURITY - THREATS, VULNERABILITIES AND COUNTERMEASURES
    SMITH, M
    [J]. INFORMATION AGE, 1989, 11 (04): : 205 - 210
  • [4] Analysis of Computer Security Incidents Using Fuzzy Logic
    Vorobiev, E. G.
    Petrenko, S. A.
    Kovaleva, I. V.
    Abrosimov, I. K.
    [J]. PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 369 - 371
  • [5] A method for analysing security threats in operational risk analysis and management
    Malerud, S.
    Fridheim, H.
    [J]. RISK, RELIABILITY AND SAFETY: INNOVATING THEORY AND PRACTICE, 2017, : 487 - 493
  • [6] Online Security Threats and Computer User Intentions
    Stafford, Thomas F.
    Poston, Robin
    [J]. COMPUTER, 2010, 43 (01) : 58 - 64
  • [7] Security Risk Analysis for Asset in relation to Vulnerability, Probability of Threats and Attacks
    Kbar, Ghassan
    [J]. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 16 - 20
  • [8] Security Threats and Risk Analysis of an Iot Web Service for a Smart Vineyard
    Borrelli, Massimo
    Coric, Vanes
    Gnauer, Clemens
    Wolfgeher, Jennifer
    Tauber, Markus
    [J]. ERCIM NEWS, 2018, (113): : 42 - 43
  • [9] Risk Analysis of Chemical, Biological, or Radionuclear Threats: Implications for Food Security
    Mohtadi, Hamid
    Murshid, Antu Panini
    [J]. RISK ANALYSIS, 2009, 29 (09) : 1317 - 1335
  • [10] Using Nature to best Clarify Computer Security and Threats
    Oreku, George S.
    Mtenzi, Fredrick J.
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 702 - 707