DocumentCode
2351256
Title
A Kind of Fuzzy Constraint Correlation Algorithm Based on Prerequisites and Consequences of Security Event
Author
Liu, Lan ; Xu, Xiaoping ; Qiu, Yunli
Author_Institution
Dept of Electron. Inf., GuangDong Polytech. Normal Univ, Guangzhou, China
Volume
2
fYear
2009
fDate
11-14 Oct. 2009
Firstpage
225
Lastpage
229
Abstract
As the rapid increase of network security events, network security monitoring and management on network behavior become more and more focused in the fields of computer science. This paper develops a kind of fuzzy constraint correlation algorithm based on prerequisites and consequences of security event. The introduction of fuzzy constraint correlation can resolve the issues of false negatives and false positives of security events in some extent.
Keywords
fuzzy set theory; security of data; computer science; fuzzy constraint correlation algorithm; network security events; network security management; network security monitoring; Computer networks; Computer security; Data security; Information analysis; Information security; Information technology; Pattern analysis; Technology management; Telecommunication traffic; Traffic control; constraint; correlation; fuzzy;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer and Information Technology, 2009. CIT '09. Ninth IEEE International Conference on
Conference_Location
Xiamen
Print_ISBN
978-0-7695-3836-5
Type
conf
DOI
10.1109/CIT.2009.15
Filename
5329097
Link To Document