Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search

About an approach to assessing the level of information security threats

Abstract

This article focuses on the problem of the research process automation of information security event statistics. The proposed approach is aimed to use earlier results for assessing the level of current information security threats.

About the Authors

E. .. Zubkov
СибГУТИ
Russian Federation


V. .. Belov
СибГУТИ
Russian Federation


References

1. Норткат С., Новак Дж. Обнаружение нарушений безопасности в сетях. 3-е издание: Пер. с англ. М.: Издательский дом «Вильямс», 2003. 448 с.

2. Интуит. Национальный открытый университет. Лекция 9: Методы классификации и прогнозирования. Деревья решений. [Электронный ресурс], http://www.intuit.ru/studies/courses/6/6/lecture/174 (дата обращения: 10.12.2014).

3. Harshna Navneet K. Fuzzy Data Mining Based Intrusion Detection System Using Genetic Algorithm. January 2014 [Электронный ресурс]. URL: http://www.ijarcce.com/upload/2014/january/IJARCCE3I_a_harshna_fuzzy.pdf, (дата обращения: 16.02.2015).


Review

For citations:


Zubkov E..., Belov V... About an approach to assessing the level of information security threats. The Herald of the Siberian State University of Telecommunications and Information Science. 2016;(4):92-98. (In Russ.)

Views: 1020


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)