• DocumentCode
    2351256
  • Title

    A Kind of Fuzzy Constraint Correlation Algorithm Based on Prerequisites and Consequences of Security Event

  • Author

    Liu, Lan ; Xu, Xiaoping ; Qiu, Yunli

  • Author_Institution
    Dept of Electron. Inf., GuangDong Polytech. Normal Univ, Guangzhou, China
  • Volume
    2
  • fYear
    2009
  • fDate
    11-14 Oct. 2009
  • Firstpage
    225
  • Lastpage
    229
  • Abstract
    As the rapid increase of network security events, network security monitoring and management on network behavior become more and more focused in the fields of computer science. This paper develops a kind of fuzzy constraint correlation algorithm based on prerequisites and consequences of security event. The introduction of fuzzy constraint correlation can resolve the issues of false negatives and false positives of security events in some extent.
  • Keywords
    fuzzy set theory; security of data; computer science; fuzzy constraint correlation algorithm; network security events; network security management; network security monitoring; Computer networks; Computer security; Data security; Information analysis; Information security; Information technology; Pattern analysis; Technology management; Telecommunication traffic; Traffic control; constraint; correlation; fuzzy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer and Information Technology, 2009. CIT '09. Ninth IEEE International Conference on
  • Conference_Location
    Xiamen
  • Print_ISBN
    978-0-7695-3836-5
  • Type

    conf

  • DOI
    10.1109/CIT.2009.15
  • Filename
    5329097