Application Self-Learning System Event Correlation Information Security Based on Fuzzy Logic Automation in Management Systems Information Security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advanced Event Correlation in Security Information and Event Management Systems

In this report, several open problems in current enterprise Security Information and Event Management systems, specifically with respect to their event correlation are discussed. An advanced event correlation using a special kind of soft pattern matching in conjunction with ontological background knowledge, Description Logic inference and a probabilistic post processing by Conditional Random Fi...

متن کامل

Towards an Intelligent Security Event Information Management System

The strategy of combining artificial intelligence (AI) and self–adaptation to optimize different types of computing services is emerging as an automated and efficient approach in computer security. Such a strategy can effectively be used to assist security experts in the protection of organizations. In particular, event correlation poses a promising challenge in providing intuition and cognitio...

متن کامل

Security, caching and self-management in distributed information systems

In this thesis, we investigate three different aspects of distributed information systems: security, caching, and self-management. We describe our concept of a security system for distributed and open systems using our query processing system ObjectGlobe as an example. One part of this concept is our OperatorCheck server, which validates the semantics of an operator and analyzes its quality bef...

متن کامل

A Modal Logic for Information System Security

As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the system security agent. Authorization specification has been extensively studied and a variety of approaches have been investigated. In this paper, we propose a knowledge oriented formal language to specify the sys...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics

سال: 2016

ISSN: 1991-976X,2409-6571

DOI: 10.14529/ctcr160116