Affiliation:
1. Department of Cyber Security of Information Systems, Don State Technical University, 344000 Rostov-on-Don, Russia
Abstract
This article discusses the possibility of generalizing the existing methods of optimization of observations to the problems of resource management of intrusion detection systems. The aim of this work is to study the applied aspects of the application of the surveillance optimization method, which increases the efficiency of using the resources of intrusion detection systems. The set goal of the work was achieved through the following tasks: (1) on the basis of experimental data, the development of a dynamic model of the controlled object and the observation model was carried out; and (2) numerical modeling of the solution to the problem of optimizing observations of the state of monitored objects in the intrusion detection system was carried out. As a result of this research, modern approaches to the management of resources of intrusion detection systems have been analyzed. A practical study of the possibility of using the mathematical apparatus for optimizing observations in relation to the problems of resource management of intrusion detection systems has been carried out. The most important scientific findings are as follows: (1) model of the dynamics of the controlled object; (2) model for monitoring the state of controlled objects; and (3) procedure for optimizing the plan for monitoring the state of monitored objects in intrusion detection systems. The significance of the results obtained is confirmed by a numerical experiment, within the framework of which a relative gain in the accuracy of assessing the state of controlled objects of 99.9% was obtained in comparison with a uniform observation plan.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference30 articles.
1. Stallings, W. (2012). Computer Security: Principles and Practice, Pearson.
2. Survey of intrusion detection systems: Techniques, datasets and challenges;Khraisat;Cybersecurity,2019
3. Using response action with intelligent intrusion detection and prevention system against web application malware;Alazab;Inf. Manag. Comput. Secur.,2014
4. Survey on Anomaly Detection using Data Mining Techniques;Agrawal;Procedia Comput. Sci.,2015
5. On Emulation-Based Network Intrusion Detection Systems;Stavrou;RAID 2014: Research in Attacks, Intrusions and Defenses,2014
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献