当前位置: X-MOL 学术Sci. Tech. Inf. Proc. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Post-Analytical Methods for Using Data Proceedings for Defense of Collective Systems
Scientific and Technical Information Processing Pub Date : 2020-05-18 , DOI: 10.3103/s0147688220010086
O. V. Syuntyurenko

Abstract—Theoretical and applied aspects of using analytical post-processing methods using multidimensional data analysis to protect resources in shared systems are investigated. New approaches, algorithms, and procedures of this process are considered on the basis of registration statistics and multidimensional data analysis, which allow counteracting the implementation of implicit indirect methods of unauthorized access (or other actions) to information. A method of evaluating the quality of monitored indicators, as well as the stationary state of the system of indicators that characterize the “image” of the user in the system, is proposed. Questions of perception of results of data post-processing by a decision maker (security service administrator) are analyzed. A method of graphical visualization of results of registration and analytical processing of fixed data is presented.

中文翻译:

使用数据过程进行集体系统防御的分析后方法

摘要-研究了使用分析后处理方法(在多维数据分析中保护共享系统中的资源)的理论和应用方面。在注册统计信息和多维数据分析的基础上考虑了此过程的新方法,算法和过程,这可以抵消对信息未经授权的访问(或其他操作)的隐式间接方法的实现。提出了一种评估监测指标质量以及表征系统中用户“图像”的指标系统静止状态的方法。分析决策者(安全服务管理员)对数据后处理结果的感知问题。
更新日期:2020-05-18
down
wechat
bug