GRNTI 20.01 Общие вопросы информатики
GRNTI 20.15 Организация информационной деятельности
The article develops methods of analytical monitoring of abnormal user behavior in a distributed information system of critical application, which is based on the use of the method of fuzzy matrix incidents. The use of matrix incidents allows you to identify atypical or inappropriate user behavior in work sessions. To illustrate the practical application of the developed methodology, an example of identifying one of the classes of user abuse is presented and the effectiveness of the methodology for analytical monitoring of abnormal user behavior in a distributed information system of critical application is evaluated.
matrix incident, abnormal user behavior, security server, logical inference attack, neural network, access subject, access object.
1. Nechetkie mnozhestva v modelyah upravleniya i iskusstvennogo intellekta / A. N. Averkin, I. Z. Batyrshin, A. F. Blishun [i dr.] ; pod red. D. A. Pospelova. - Moskva : Nauka, 1986. - 311 s.
2. Borisov, A.N. Modeli prinyatiya resheniy na osnove lingvisticheskoy peremennoy / A.N. Borisov. - Riga : Zinatne, 1982. - 256 s.
3. Kallan, R. Osnovnye koncepcii neyronnyh setey / R. Kallan. - M. : Izdatel'skiy dom «Vil'yams», 2001. - 287 s.
4. Kofman, A. Vvedenie teorii nechetkih mnozhestv v upravlenie predpriyatiyami / A. Kofman, A.H. Hil. - Minsk : Vysheyshaya shkola, 1992. - 224 s.
5. Metodologicheskie osnovy intellektual'noy zaschity informacii ot nesankcionirovannogo dostupa v avtomatizirovannyh sistemah upravleniya kriticheskogo primeneniya / M.V. Bochkov, O.V. Lankin, O.Yu. Makarov, E.A. Rogozin. - Voronezh : VGU, 2011. - 366 s.