scholarly journals G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Peng Lu ◽  
Teng Hu ◽  
Hao Wang ◽  
Ruobin Zhang ◽  
Guo Wu

The attacks on the critical infrastructure network have increased sharply, and the strict management measures of the critical infrastructure network have caused its correlation analysis technology for security events to be relatively backward; this makes the critical infrastructure network’s security situation more severe. Currently, there is no common correlation analysis technology for the critical infrastructure network, and most technologies focus on expanding the dimension of data analysis, but with less attention to the optimization of analysis performance. The analysis performance does not meet the practical environment, and real-time analysis is even more impossible; as a result, the efficiency of security threat detection is greatly declined. To solve this issue, we propose the greedy tree algorithm, a correlation analysis approach based on the greedy algorithm, which optimizes event analysis steps and significantly improves the performance, so the real-time correlation analysis can be realized. We first verify the performance of the algorithm through formalization, and then the G-CAS (Greedy Correlation Analysis System) is implemented based on this algorithm and is applied in a real critical infrastructure network, which outperformed the current mainstream products.

Author(s):  
Brian T. Contos ◽  
William P. Crowell ◽  
Colby DeRodeff ◽  
Dan Dunkel ◽  
Eric Cole ◽  
...  

Author(s):  
R.P. Goehner ◽  
W.T. Hatfield ◽  
Prakash Rao

Computer programs are now available in various laboratories for the indexing and simulation of transmission electron diffraction patterns. Although these programs address themselves to the solution of various aspects of the indexing and simulation process, the ultimate goal is to perform real time diffraction pattern analysis directly off of the imaging screen of the transmission electron microscope. The program to be described in this paper represents one step prior to real time analysis. It involves the combination of two programs, described in an earlier paper(l), into a single program for use on an interactive basis with a minicomputer. In our case, the minicomputer is an INTERDATA 70 equipped with a Tektronix 4010-1 graphical display terminal and hard copy unit.A simplified flow diagram of the combined program, written in Fortran IV, is shown in Figure 1. It consists of two programs INDEX and TEDP which index and simulate electron diffraction patterns respectively. The user has the option of choosing either the indexing or simulating aspects of the combined program.


2020 ◽  
Vol 67 (4) ◽  
pp. 1197-1205 ◽  
Author(s):  
Yuki Totani ◽  
Susumu Kotani ◽  
Kei Odai ◽  
Etsuro Ito ◽  
Manabu Sakakibara

2021 ◽  
Vol 2021 (4) ◽  
pp. 7-16
Author(s):  
Sivaraman Eswaran ◽  
Aruna Srinivasan ◽  
Prasad Honnavalli

Sign in / Sign up

Export Citation Format

Share Document