Analysis of computer security incidents using fuzzy logic
Title | Analysis of computer security incidents using fuzzy logic |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Vorobiev, E. G., Petrenko, S. A., Kovaleva, I. V., Abrosimov, I. K. |
Conference Name | 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM) |
Date Published | May 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5386-1810-3 |
Keywords | Algorithm design and analysis, author signatures, computer security, computer security incident analysis, computer security incidents, Computers, cyber-attacks, cyberattacks, design pattern SOPKA, detection and prevention of cyber-attacks, digital signatures, Fuzzy logic, Information security, Information services, Metrics, processing algorithm, Protocols, pubcrawl, recommender systems, Resiliency, Russian Federation, Russian ViPNet technology, security, the development of cyber-attack signatures |
Abstract | The work proposes and justifies a processing algorithm of computer security incidents based on the author's signatures of cyberattacks. Attention is also paid to the design pattern SOPKA based on the Russian ViPNet technology. Recommendations are made regarding the establishment of the corporate segment SOPKA, which meets the requirements of Presidential Decree of January 15, 2013 number 31c "On the establishment of the state system of detection, prevention and elimination of the consequences of cyber-attacks on information resources of the Russian Federation" and "Concept of the state system of detection, prevention and elimination of the consequences of cyber-attacks on information resources of the Russian Federation" approved by the President of the Russian Federation on December 12, 2014, No K 1274. |
URL | https://ieeexplore.ieee.org/document/7970587 |
DOI | 10.1109/SCM.2017.7970587 |
Citation Key | vorobiev_analysis_2017 |
- information security
- the development of cyber-attack signatures
- security
- Russian ViPNet technology
- Russian Federation
- Resiliency
- recommender systems
- pubcrawl
- Protocols
- processing algorithm
- Metrics
- Information services
- Algorithm design and analysis
- Fuzzy logic
- digital signatures
- detection and prevention of cyber-attacks
- design pattern SOPKA
- cyberattacks
- cyber-attacks
- Computers
- computer security incidents
- computer security incident analysis
- computer security
- author signatures