Informatics and Applications
2016, Volume 10, Issue 3, pp 2-8
INTEGRATION OF STATISTICAL AND DETERMINISTIC METHODS FOR ANALYSIS OF INFORMATION SECURITY
- A. A. Grusho
- N. A. Grusho
- M. I. Zabezhailo
- E. E. Timonina
Abstract
The paper is devoted to the methods of automatic analysis of information security and control mechanisms in cloudy computing environments. The considered approaches are based on synthesis of probabilistic and statistical and deterministic methods. The statistical analysis allows creating a set of objects for the deterministic (logical) analysis. As deterministic methods demand large volumes of calculations, preliminary statistical processing allows to reduce volumes of data for the deterministic (logical) analysis. In the paper, deterministic methods are presented by analogs of search of causal relationships. Application of heuristic and plausible reasonings can generate doubtful conclusions which are connected with random character of source data. Therefore, the analysis of random generation of deterministic conclusions is considered. The suggested methods of the analysis are focused on two-level architecture of information security system in cloudy computing environments. In this architecture, a slow automatic data mining generates at the top level fast reaction for resolution of conflicts in computing processes or identification of malicious code functioning.
[+] References (10)
- Tukey, J. W. 1977. Exploratory data analysis. Addison- Wesley Pub. Co. 688 p.
- Nortcutt, S., M. Cooper, M. Fearnow, and K. Frederik. 2001. Intrusion signatures and analysis. New Readers Pub. 408 p.
- Grusho, A., M. Zabezhaylo, and A. Zatsarinny 2015. Kontrol' i upravlenie informatsionnymi potokami v oblachnoy srede [Control and management of information streams in the cloudy environment]. Informatika i ee Primeneniya - Inform. Appl. 9(4):95-101.
- Bendat, J. S., and A. G. Piersol. 1986. Random data: Analysis and measurement procedures. 2nd ed. New York, NY John Wiley and Sons. 566 p.
- Zhuravlev, Yu. I. 1977-1978. Korrektnye algebry nad mnozhestvom nekorrektnykh (evristicheskikh) algoritmov. Ch. I (1977); Ch. II (1977); Ch. III (1978) [Correct algebras over a set of incorrect (heuristic) algorithms.
Part I (1977), Part II (1977), Part III (1978)]. Kibernetika [Cybernetics] I(4):5-17; II(6):21-27; III(2):35-43.
- Pankratova, E. S., and V. K. Finn. 2009. Avtomaticheskoe porozhdenie gipotez [Automatic hypothesis generation in intelligent systems]. Ed. V. K. Finn. Moscow: Librokom. 528 p.
- Hampel FR., E. M. Ronchetti, P. J. Rousseeuw, and W.A. Stahel. 1986. Robust statistics. The approach based on influence functions. John Willey and Sons, Inc. 509 p.
- Feller, W 1950. An introduction to probability theory and its applications. 2d ed. New York, NY: John Wiley and Sons, Inc. Vol. 1. 520 p.
- Loeve, M. 1955. Probability theory. Princeton, NJ: D Van Nostrand. 701 p.
- Grusho, A., N. Grusho, E. Timonina, and S. Shorgin. 2014. Bezopasnye arkhitektury raspredelennykh sistem [Secure architecture of the distributed systems]. Sistemy
i Sredstva Informatiki - Systems and Means of Informatics 24(3):18-31.
[+] About this article
Title
INTEGRATION OF STATISTICAL AND DETERMINISTIC METHODS FOR ANALYSIS OF INFORMATION SECURITY
Journal
Informatics and Applications
2016, Volume 10, Issue 3, pp 2-8
Cover Date
2016-08-30
DOI
10.14357/19922264160301
Print ISSN
1992-2264
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
cloudy computing environments; information security; probabilistic and statistical and deterministic (logical) methods of the analysis; heuristic algorithms; mutual influence of data
Authors
A. A. Grusho , N. A. Grusho ,
M. I. Zabezhailo , and E. E. Timonina
Author Affiliations
Institute of Informatics Problems, Federal Research Center “Computer Sciences and Control” of the Russian
Academy of Sciences, 44-2 Vavilov Str.,Moscow 119333, Russian Federation
|