Analysis of Computer Security Incidents Using Fuzzy Logic

被引:0
|
作者
Vorobiev, E. G. [1 ]
Petrenko, S. A. [1 ]
Kovaleva, I. V. [1 ]
Abrosimov, I. K. [1 ]
机构
[1] St Petersburg Electrotech Univ LETI, Dept Comp Secur, St Petersburg, Russia
关键词
fuzzy logic; cyber-attacks; detection and prevention of cyber-attacks; the development of cyber-attack signatures;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The work proposes and justifies a processing algorithm of computer security incidents based on the author's signatures of cyberattacks. Attention is also paid to the design pattern SOPKA based on the Russian ViPNet technology. Recommendations are made regarding the establishment of the corporate segment SOPKA, which meets the requirements of Presidential Decree of January 15, 2013 number 31c "On the establishment of the state system of detection, prevention and elimination of the consequences of cyber-attacks on information resources of the Russian Federation" and "Concept of the state system of detection, prevention and elimination of the consequences of cyber-attacks on information resources of the Russian Federation" approved by the President of the Russian Federation on December 12, 2014, No K 1274.
引用
收藏
页码:369 / 371
页数:3
相关论文
共 50 条
  • [1] Application of Fuzzy Logic in Computer Security and Forensics
    Al Amro, S.
    Chiclana, F.
    Elizondo, D. A.
    [J]. COMPUTATIONAL INTELLIGENCE FOR PRIVACY AND SECURITY, 2012, 394 : 35 - +
  • [2] Analysis of computer user behavior, security incidents and fraud using Self-Organizing Maps
    Uruena Lopez, Alberto
    Mateo, Fernando
    Navio-Marco, Julio
    Maria Martinez-Martinez, Jose
    Gomez-Sanchis, Juan
    Vila-Frances, Joan
    Jose Serrano-Lopez, Antonio
    [J]. COMPUTERS & SECURITY, 2019, 83 : 38 - 51
  • [3] Performance analysis of medical image security using steganography based on fuzzy logic
    T. Yuvaraja
    R. S. Sabeenian
    [J]. Cluster Computing, 2019, 22 : 3285 - 3291
  • [4] Performance analysis of medical image security using steganography based on fuzzy logic
    Yuvaraja, T.
    Sabeenian, R. S.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S3285 - S3291
  • [5] Fuzzy risk analysis of computer security threats
    Yu, Yingbing
    Shindhelm, Art
    [J]. 2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 1 - 8
  • [6] Security Risk Assessment Method Using Fuzzy Logic
    Ismagilov, Ilyas I.
    Molotov, Linar A.
    Gilmullin, Timur M.
    Anikin, Igor, V
    Katasev, Alexey S.
    [J]. HELIX, 2018, 8 (06): : 4674 - 4682
  • [7] Keystroke Identifier Using Fuzzy Logic to Increase Password Security
    Shaout, Adnan
    Schmidt, Nathan
    [J]. 2020 21ST INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2020,
  • [8] Multicriteria Security System Performance Assessment Using Fuzzy Logic
    McGill, William L.
    Ayyub, Bilal M.
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2007, 4 (04): : 356 - 376
  • [9] Fault-tree Analysis on Computer Security System Using Intuitionistic Fuzzy Sets
    Miao, Zhuqi
    Wang, Zhoujing
    [J]. ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 459 - 463
  • [10] Computer aided selection of cutting parameters by using fuzzy logic
    Yilmaz, O
    Görür, G
    Dereli, T
    [J]. COMPUTATIONAL INTELLIGENCE: THEORY AND APPLICATIONS, PROCEEDINGS, 2001, 2206 : 854 - 870