ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

DETECTION ENVIRONMENT FORMATION METHOD FOR ANOMALY DETECTION SYSTEMS

Journal: International Journal of Mechanical Engineering and Technology(IJMET) (Vol.10, No. 3)

Publication Date:

Authors : ; ;

Page : 220-235

Keywords : detection rules; attacks; cyber-attacks; anomalies; intrusion detection systems; anomaly detection systems; attack detection systems.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Due to the intensive development of the digital business, malicious software and other cyber threats are becoming more common. In order to increase the level of security there are needed appropriate special countermeasures, which are able to remain effective when new types of threats occur, and which allow to detect cyberattacks targeting on a set of information system resources in fuzzy conditions. Different attacking effects on the corresponding resources generate various sets of anomalies in a heterogeneous parametric environment. There is known a tuple model of the formation of a set of basic components that allow to identify cyber-attacks. For its effective application a formal implementation of the approach to the formation of sets of basic detection rules is necessary. For this purpose, there has been developed a method that focuses on solving problems of cyber-attacks detection in computer systems, which is implemented through three basic steps:

Last modified: 2019-05-22 22:33:02