Abstract
Analysis of information security monitoring data is based on detection of anomalies causalities in “normal” process of an information system operation.
In the paper the JSM-method of data mining in the solution of this task is considered. For this purpose in identical situations the objects generated by “normal” data and anomalies are built. Further these objects are researched by JSM-method as the positive and negative examples of anomalies appearance.
The causalities of anomalies appearance found by JSM-method can be used as signatures for fast determination of information security violations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Legg, S., Hutter, M.: A collection of definitions of intelligence. Technical report, IDSIA-07-07, 15 June 2007
Legg, S., Hutter, M.: Universal intelligence: a definition of machine intelligence. J. Minds Mach. 17(4), 391–444 (2007). arXiv:0712.3329v1 [cs.AI]
Grusho, A., Zabezhailo, M., Zatsarinnyi, A., Piskovskii, V., Borokhov, S.V.: On the potential applications of data mining for information security provision of cloud-based environments. J. Autom. Documentation Math. Linguist. 49(6), 193–201 (2015). doi:10.3103/S0005105515060023
Grusho, A.A., Grusho, N.A., Timonina, E.E., Shorgin, S.Y.: Possibilities of secure architecture creation for dynamically changing information system. J. Syst. Means Inform. 25(3), 78–93 (2015)
Tukey, J.W.: Exploratory Data Analysis. Addison-Wesley Pub. Co., Reading (1977)
Finn, V.K. (eds.) Automatic Hypothesis Generation in Intelligent Systems. KD “LIBROKOM”, Moscow (2009)
Anshakov, O.M.: About one interpretation of the DSM-method of automatic generation of hypotheses. In: Finn, V.K. (eds.) Automatic Hypothesis Generation in Intelligent Systems, pp. 78–91. KD “LIBROKOM”, Moscow (2009)
Finn, V.K., Mikheenkova, M.A.: About Situation-Dependent Extension of the DSM-method of Automatic Generation of Hypotheses. In: Finn, V.K. (eds.) Automatic Hypothesis Generation in Intelligent Systems, pp. 428–445. KD “LIBROKOM”, Moscow (2009)
Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A.: On the advanced procedure to reduce calculation of galois closures. J. Inform. Appl. 10(4), 97–106 (2016). doi:10.14357/19922264160410
Grusho, A., Timonina, E.: Prohibitions in discrete probabilistic statistical problems. J. Discrete Math. Appl. 21(3), 275–281 (2011). doi:10.4213/dm1140
Grusho, A., Timonina, E.: Consistent sequences of tests defined by bans. Optimization Theory, Decision Making, and Operation Research Applications. Springer Proceedings in Mathematics and Statistics, pp. 281–291. Springer, Heidelberg (2013). doi:10.1007/978-1-4614-5134-1_20
Grusho, A., Grusho, N., Timonina, E.: Power functions of statistical criteria defined by bans. In: Proceeding of 29th European Conference on Modelling and Simulation ECMS 2015, pp. 617–621. Digitaldruck Pirrot GmbH, Germany (2016)
Grusho, A., Grusho, N., Timonina, E.: Statistical classification in monitoring systems. In: Proceeding of 30th European Conference on Modelling and Simulation ECMS 2016, pp. 658–662. Digitaldruck Pirrot GmbH, Germany (2015)
Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A., Nikolaeb, A.V., Piskovski, V.O., Timonina, E.E.: Erroneous states classifications in dictributed computing systems and sources of their occurences. J. Syst. Means Inform. 27(2), 30–41 (2017). doi:10.14357/08696527170203
Acknowledgements
The research is supported by Russian Foundation for Basic Research (project 15-29-07981).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Grusho, A. (2017). Data Mining and Information Security. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-65127-9_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65126-2
Online ISBN: 978-3-319-65127-9
eBook Packages: Computer ScienceComputer Science (R0)