Visible to the public Analysis of computer security incidents using fuzzy logic

TitleAnalysis of computer security incidents using fuzzy logic
Publication TypeConference Paper
Year of Publication2017
AuthorsVorobiev, E. G., Petrenko, S. A., Kovaleva, I. V., Abrosimov, I. K.
Conference Name2017 XX IEEE International Conference on Soft Computing and Measurements (SCM)
Date PublishedMay 2017
PublisherIEEE
ISBN Number978-1-5386-1810-3
KeywordsAlgorithm design and analysis, author signatures, computer security, computer security incident analysis, computer security incidents, Computers, cyber-attacks, cyberattacks, design pattern SOPKA, detection and prevention of cyber-attacks, digital signatures, Fuzzy logic, Information security, Information services, Metrics, processing algorithm, Protocols, pubcrawl, recommender systems, Resiliency, Russian Federation, Russian ViPNet technology, security, the development of cyber-attack signatures
Abstract

The work proposes and justifies a processing algorithm of computer security incidents based on the author's signatures of cyberattacks. Attention is also paid to the design pattern SOPKA based on the Russian ViPNet technology. Recommendations are made regarding the establishment of the corporate segment SOPKA, which meets the requirements of Presidential Decree of January 15, 2013 number 31c "On the establishment of the state system of detection, prevention and elimination of the consequences of cyber-attacks on information resources of the Russian Federation" and "Concept of the state system of detection, prevention and elimination of the consequences of cyber-attacks on information resources of the Russian Federation" approved by the President of the Russian Federation on December 12, 2014, No K 1274.

URLhttps://ieeexplore.ieee.org/document/7970587
DOI10.1109/SCM.2017.7970587
Citation Keyvorobiev_analysis_2017