Advertisement

Automatic Control and Computer Sciences

, Volume 50, Issue 8, pp 722–725 | Cite as

Intelligent data analysis in information security

  • A. A. Grusho
  • N. A. Grusho
  • M. I. Zabezhailo
  • E. E. Timonina
Article
  • 66 Downloads

Abstract

At present, there are a large number of trends and developments in artificial intelligence systems. This paper deals with the available intelligent data analysis in information security and the possibilities provided by data mining. Examples of tasks that can be solved using artificial intelligence systems are presented, including safe resource management, prediction of critical states and failures, resolution of conflicts in computational processes and information security regulations, and forensics.

Keywords

information security data mining distributed information systems 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Grusho, A.A., Grusho, N.A., Timonina, E.E., and Shorgin, S.Ya., Possibilities of secure architecture creation for dynamically changing information system, Sist. Sredstva Inf., 2015, vol. 25, no. 3, pp. 78–93.Google Scholar
  2. 2.
    Nilsson, N., Problem-Solving Methods in Artificial Intelligence, New York: McGraw-Hill, 1971.Google Scholar
  3. 3.
    Zabezhailo, M.I., Data mining–a new direction of development of information technologies, Nauchn.-Tekhn. Inform., Ser. 2. Protsessy Sist., 1998, no. 8, pp. 6–17.Google Scholar
  4. 4.
    Finn, V.K., About data mining, Nov. Iskusstv. Intell., 2004, no. 3, pp. 3–18.Google Scholar
  5. 5.
    Finn, V.K., Detecting empirical regularities in bases of facts using JSM reasoning, Autom. Doc. Math. Linguist., 2015, no. 8, pp. 1–29.Google Scholar
  6. 6.
    HP Open View Operations Center. Concepts Guide, HP Part No. B1969-90001, 1995.Google Scholar
  7. 7.
    Axelsson, S., The base-rate fallacy and its implications for the difficulty of intrusion detection, Proc. of the 6th Conference on Computer and Communications Security, 1999, New York, pp. 1–7.Google Scholar
  8. 8.
    Grusho, A.A. and Timonina, E.E., Prohibitions in discrete probabilistic statistical problems, Diskrete Mat. and Appl., 2011, vol. 21, no.3, pp. 275–281.MathSciNetzbMATHGoogle Scholar
  9. 9.
    Grusho, A., Grusho, N., and Timonina, E., Consistent sequences of tests defined by bans, in Springer Proceedings in Mathematics & Statistics, Optimization Theory, Decision Making, and Operation Research Applications, Springer New York Heidelberg Dordrecht London, 2013, pp. 281–291.CrossRefGoogle Scholar
  10. 10.
    Grusho, A., Grusho, N., and Timonina, E., Power functions of statistical criteria defined by bans, Proceedings of 29th European Conference on Modelling and Simulation ECMS 2015, May 26th–May 29th, 2015, Albena (Varna), 2015, pp. 617–621.Google Scholar
  11. 11.
    Denning, D.E., An intrusion detection model, Proceedings of the Seventh IEEE Symposium on Security and Privacy, 1986, pp. 119–131.Google Scholar
  12. 12.
    Lunt, T.F., Detecting intruders in computer systems, Proceedings of the 1993 conference on auditing and computer technology, SRI International. http://www.researchgate.net/profile/Teresa_Lunt/publication/2304057_ Detecting_Intruders_in_Computer_Systems/links/552e86500cf2acd38cba5c94.pdf.Google Scholar
  13. 13.
    Tukey, J., Exploratory Data Analysis, Pearson, 1977.zbMATHGoogle Scholar
  14. 14.
    Zhuravlev, Y.I., Correct algebras on sets of incorrect (heuristic) algorithms, Kibernetika, Part I, 1977, no. 4, pp. 5–17; Part II, 1977, no. 6, pp. 21–27; Part III, 1978, no. 2, pp. 35–43.zbMATHGoogle Scholar
  15. 15.
    Zhuravlev, Yu.I. and Rudakov, K.V., On the algebraic correction of information processing (conversion) procedures, Probl. Prikl. Mat. Inf., 1987, pp. 187–198.Google Scholar
  16. 16.
    Fedotov, N.N., Computer Forensics, Moscow: Yuridicheskii Mir, 2007.Google Scholar
  17. 17.
    Avtomaticheskoe porozhdenie gipotez v intellektual’nykh sistemakh (Automatic Generation of Hypotheses in Intelligent Systems), Finn, V.K., Ed., Moscow: LIBROKOM, 2009.Google Scholar

Copyright information

© Allerton Press, Inc. 2016

Authors and Affiliations

  • A. A. Grusho
    • 1
  • N. A. Grusho
    • 1
  • M. I. Zabezhailo
    • 1
  • E. E. Timonina
    • 1
  1. 1.Federal Research Center Computer Sciences and ControlRussian Academy of SciencesMoscowRussia

Personalised recommendations