DocumentCode :
3700108
Title :
The tupel model of basic components´ set formation for cyberattacks
Author :
Anna Korchenko;Kornel Warwas;Aleksandra Klos-Witkowska
Author_Institution :
National Aviation University, 1 Kosmonavta Komarova Ave, Kyiv, 03058 Ukraine
Volume :
1
fYear :
2015
Firstpage :
478
Lastpage :
483
Abstract :
The unauthorized access to information systems resources, for instants cyberattacks, can impact on its surrounding area, causing the certain anomalies. Mostly this area is not formalizing and not clearly defined. To detect cyberattacks required specialized tools, which make it possible using a set of specific features. One of the approaches to solving this task is based on using corresponding models, methods and intrusion detection systems based on fuzzy sets focused on processing of semistructured data with a purpose to establish the facts of unauthorized access to information systems resources. In this work proposed, based on a tuple model, the formalization approach to build up the necessary dataset component, which are used to control the status of cyberspace parameters at a given time in a fuzzy conditions. This approach gives a possibility to identify the abnormal state generated by the action of the relevant cyberattacks class.
Keywords :
"Computer crime","Standards","Intrusion detection","Pragmatics","Computational modeling","Data models"
Publisher :
ieee
Conference_Titel :
Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2015 IEEE 8th International Conference on
Print_ISBN :
978-1-4673-8359-2
Type :
conf
DOI :
10.1109/IDAACS.2015.7340782
Filename :
7340782
Link To Document :
بازگشت