Abstract

One of the basic tasks related to the field of information security is the development of network and system resources protection systems based on the abnormal principle. To develop and extend the functionality of such systems the method of anomaly detection caused by cyber attacks in the information systems is used. In this method the parameters fuzzification process is not formalized, that reduces the efficiency of its use. With this objective the method which is based on linguistic standards, mathematical models, methods of indistinct logic is offered and is realized by means of three basic stages: occurrence and parameters of frequency formation; the formation of correction standards; the development of fuzzy parameters. Through these stages it is carried out the fuzzification of current values at the decision of problems of cyber attacks detection in computer systems that will increase the efficiency of construction of intrusion detection systems.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.