An Algorithm to Compare Computer-security Knowledge from Different Sources

Gulnara Yakhyaeva, Olga Yasinkaya

2015

Abstract

In this paper we describe a mathematical apparatus and software implementation of a module of the RiskPanel system, aimed to compare computer-security knowledge learned from various online sources. To describe this process, we use model-theoretic formalism. The knowledge of a particular computer attack obtained from the same source is formalized as an underdetermined algebraic system, which we call a generalized case. The knowledge base is a set of generalized cases. To implement the knowledge comparison, we construct a generalized fuzzy model, the product of all algebraic systems stored in the database. We consider an algorithm for computing consistent truth values and describe a software implementation of the developed methods. The developed algorithm has polynomial complexity.

Download


Paper Citation


in Harvard Style

Yakhyaeva G. and Yasinkaya O. (2015). An Algorithm to Compare Computer-security Knowledge from Different Sources . In Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 1: ICEIS, ISBN 978-989-758-096-3, pages 565-572. DOI: 10.5220/0005347205650572

in Bibtex Style

@conference{iceis15,
author={Gulnara Yakhyaeva and Olga Yasinkaya},
title={An Algorithm to Compare Computer-security Knowledge from Different Sources},
booktitle={Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 1: ICEIS,},
year={2015},
pages={565-572},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005347205650572},
isbn={978-989-758-096-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 1: ICEIS,
TI - An Algorithm to Compare Computer-security Knowledge from Different Sources
SN - 978-989-758-096-3
AU - Yakhyaeva G.
AU - Yasinkaya O.
PY - 2015
SP - 565
EP - 572
DO - 10.5220/0005347205650572