EXPERIMENTAL EVALUATION OF THE DETECTION OF ANOMALIES IN A COMPUTER NETWORK

Author(s):  
А.Н. Цибуля ◽  
А.И. Козачок ◽  
В.М. Козлова

В статье рассматривается оптимизированный подход к контролю инцидентов информационной безопасности компьютерной сети и обнаружению аномалий. Обоснована необходимость использования алгоритма «усечения» полного множества факторов нарушения политики информационной безопасности. The article considers an optimized approach to monitoring computer network information security incidents and detecting anomalies. The necessity of using the algorithm of «truncation» of the full set of factors of violation of the information security policy is justified.

2004 ◽  
Vol 16 (3) ◽  
pp. 263-274 ◽  
Author(s):  
Joshua Onome Imoniana

Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.


Sign in / Sign up

Export Citation Format

Share Document