Informatika i Ee Primeneniya [Informatics and its Applications]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Inform. Primen.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Informatika i Ee Primeneniya [Informatics and its Applications], 2016, Volume 10, Issue 3, Pages 2–8
DOI: https://doi.org/10.14357/19922264160301
(Mi ia425)
 

This article is cited in 2 scientific papers (total in 2 papers)

Integration of statistical and deterministic methods for analysis of information security

A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina

Institute of Informatics Problems, Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
Full-text PDF (187 kB) Citations (2)
References:
Abstract: The paper is devoted to the methods of automatic analysis of information security and control mechanisms in cloudy computing environments. The considered approaches are based on synthesis of probabilistic and statistical and deterministic methods. The statistical analysis allows creating a set of objects for the deterministic (logical) analysis. As deterministic methods demand large volumes of calculations, preliminary statistical processing allows to reduce volumes of data for the deterministic (logical) analysis. In the paper, deterministic methods are presented by analogs of search of causal relationships. Application of heuristic and plausible reasonings can generate doubtful conclusions which are connected with random character of source data. Therefore, the analysis of random generation of deterministic conclusions is considered. The suggested methods of the analysis are focused on two-level architecture of information security system in cloudy computing environments. In this architecture, a slow automatic data mining generates at the top level fast reaction for resolution of conflicts in computing processes or identification of malicious code functioning.
Keywords: cloudy computing environments; information security; probabilistic and statistical and deterministic (logical) methods of the analysis; heuristic algorithms; mutual influence of data.
Funding agency Grant number
Russian Foundation for Basic Research 15-29-07981_офи-м
15-07-02053_а
The paper was supported by the Russian Foundation for Basic Research (projects 15-29-07981 and 15-07-02053).
Received: 27.06.2016
Bibliographic databases:
Document Type: Article
Language: Russian
Citation: A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina, “Integration of statistical and deterministic methods for analysis of information security”, Inform. Primen., 10:3 (2016), 2–8
Citation in format AMSBIB
\Bibitem{GruGruZab16}
\by A.~A.~Grusho, N.~A.~Grusho, M.~I.~Zabezhailo, E.~E.~Timonina
\paper Integration of statistical and deterministic methods for analysis of information security
\jour Inform. Primen.
\yr 2016
\vol 10
\issue 3
\pages 2--8
\mathnet{http://mi.mathnet.ru/ia425}
\crossref{https://doi.org/10.14357/19922264160301}
\elib{https://elibrary.ru/item.asp?id=26704813}
Linking options:
  • https://www.mathnet.ru/eng/ia425
  • https://www.mathnet.ru/eng/ia/v10/i3/p2
  • This publication is cited in the following 2 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Информатика и её применения
    Statistics & downloads:
    Abstract page:432
    Full-text PDF :103
    References:57
    First page:1
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024