Access control visualization using triangular matrices

M Kolomeets, A Chechulin, I Kotenko… - 2019 27th Euromicro …, 2019 - ieeexplore.ieee.org
The paper proposes an approach for visualization of access control systems based on
triangular matrices. The approach is used for visualization of access control security model …

Интеллектуальные сервисы защиты информации в критических инфраструктурах

ИВ Котенко, ИБ Саенко, ЕВ Дойникова, ЕС Новикова… - 2019 - elibrary.ru
В монографии рассмотрены ключевые вопросы, связанные с построением и
функционированием интеллектуальных сервисов защиты информации в критических …

RMMDI: A Novel Framework for Role Mining Based on the Multi‐Domain Information

W Bai, Z Pan, S Guo, Z Chen - Security and Communication …, 2019 - Wiley Online Library
Role‐based access control (RBAC) is widely adopted in network security management, and
role mining technology has been extensively used to automatically generate user roles from …

An approach to modeling the decision support process of the security event and incident management based on Markov chains

I Kotenko, I Parashchuk - IFAC-PapersOnLine, 2019 - Elsevier
An approach to the specification of the dynamics of changes in the values of quality
indicators, which characterize the decision support process for security event and incident …

Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework

I Kotenko, N Komashinsky - … of the 12th international conference on …, 2019 - dl.acm.org
The paper proposes an approach to security information processing in order to detect
computer attacks and network anomalies based on big data technologies. The main …

MDC-Checker: A novel network risk assessment framework for multiple domain configurations

W Bai, Z Pan, S Guo, Z Chen, S Xia - Computers & Security, 2019 - Elsevier
It is a challenging task to generate correct network configurations to minimize the attack
surface while meeting practical requirements, especially when the interdependent …

Network Protocols Determination Based on Raw Data Analysis for Security Assesment under Uncertainty

D Gaifulina, A Fedorchenko… - 2019 10th IEEE …, 2019 - ieeexplore.ieee.org
The paper is devoted to issues of the network traffic analysis in conditions of uncertain
network protocol specifications. We propose an approach to identify typical structures of …

Adaptive Touch Interface: Application for Mobile Internet Security

K Zhernova, M Kolomeets, I Kotenko… - … Symposium on Mobile …, 2019 - Springer
In modern means of mobile Internet security, including those based on touch screens,
various visualization models are used. However, with the increasing complexity of these …