hrcak mascot   Srce   HID

Izvorni znanstveni članak
https://doi.org/10.2498/cit.1000961

An Expert System-Based Site Security Officer

Olusola Adeniran
Ronke Ikuomola
Adesina Simon Sodiya

Puni tekst: engleski, pdf (1 MB) str. 227-235 preuzimanja: 606* citiraj
APA 6th Edition
Adeniran, O., Ikuomola, R. i Sodiya, A.S. (2007). An Expert System-Based Site Security Officer. Journal of computing and information technology, 15 (3), 227-235. https://doi.org/10.2498/cit.1000961
MLA 8th Edition
Adeniran, Olusola, et al. "An Expert System-Based Site Security Officer." Journal of computing and information technology, vol. 15, br. 3, 2007, str. 227-235. https://doi.org/10.2498/cit.1000961. Citirano 18.02.2020.
Chicago 17th Edition
Adeniran, Olusola, Ronke Ikuomola i Adesina Simon Sodiya. "An Expert System-Based Site Security Officer." Journal of computing and information technology 15, br. 3 (2007): 227-235. https://doi.org/10.2498/cit.1000961
Harvard
Adeniran, O., Ikuomola, R., i Sodiya, A.S. (2007). 'An Expert System-Based Site Security Officer', Journal of computing and information technology, 15(3), str. 227-235. https://doi.org/10.2498/cit.1000961
Vancouver
Adeniran O, Ikuomola R, Sodiya AS. An Expert System-Based Site Security Officer. Journal of computing and information technology [Internet]. 2007 [pristupljeno 18.02.2020.];15(3):227-235. https://doi.org/10.2498/cit.1000961
IEEE
O. Adeniran, R. Ikuomola i A.S. Sodiya, "An Expert System-Based Site Security Officer", Journal of computing and information technology, vol.15, br. 3, str. 227-235, 2007. [Online]. https://doi.org/10.2498/cit.1000961

Sažetak
A Site Security Officer (SSO) who is a network security staff that responds to alarms from an Intrusion Detection System (IDS), is always faced with the critical problem of low response time when the network becomes big. Even a skilled SSO is hard-pressed and less productive when collecting and analyzing IDS output manually as the frequency of intrusion increases. In this work, an Expert System-Based SSO (ExSSO) is designed to correct this problem. The design presents an architecture that encodes associated expert rules for responding to different categories of intrusions into its rule-based component. The Intrusion Index (II), which determines the extent of intrusion, is calculated to classify intrusions into three categories namely low, high and very high. The inference engine component utilizes the encoded rules to interpret and respond to intrusions based on the Intrusion Index. Visual Basic 6.0 is used to implement the design because of its interactiveness and high ability to support database. Testing the new design with data from three different network environments, the result shows a system that can investigate and respond to an average of 57 intrusions per minute as against the maximum response time of 2 per three minutes in human-based SSO.

Hrčak ID: 44619

URI
https://hrcak.srce.hr/44619

Posjeta: 770 *