350 rub
Journal Highly available systems №4 for 2016 г.
Article in number:
On the question of the choice of performance indicators of data mining techniques usage, while ensuring information security of cloud computing environments
Authors:
S.V. Borokhov - Senior Research Scientist, FRC «Computer Science and Control» RAS (Moscow) E-mail: sborokhov@ipiran.ru P.A. Keyer - Senior Research Scientist, FRC «Computer Science and Control» RAS (Moscow) E-mail: pkeyer@ipiran.ru
Abstract:
The principles for determining the effectiveness of data mining techniques for information security in cloud computing environments are presented. As a result of the research, it was found out that the current regulations governing the use of information security issues and metrics cannot be used to determine the performance of using IDA methods for ensuring information security of cloud computing en-vironments.
Pages: 54-59
References

 

  1. Grusho A.A., Zabezhajjlo M.I., Zacarinnyjj A.A., Piskovskijj V.O., Borokhov S.V. O vozmozhnostjakh prilozhenijj intellektualnogo analiza dannykh v zadachakh obespechenija informacionnojj bezopasnosti oblachnykh sred // NTI. Ser. 2. Informacionnye processy i sistemy. 2015. № 11.
  2. Grusho A.A., Zabezhajjlo M.I., Zacarinnyjj A.A. Kontrol i upravlenie informacionnymi potokami v oblachnojj srede // Informatika i ee primenenie. 2015. T. 9. № 9. S. 91−97.
  3. GOST R ISO/MEHK 27004-2011. Informacionnaja tekhnologija. Metody i sredstva obespechenija bezopasnosti. Menedzhment informacionnojj bezopasnosti. Izmerenija. http://docs.cntd.ru/document/1200088532.
  4. National Institute of Standards and Technology (NIST) Special Publication 800-55 Revision 1 «Performance Measurement Guide for Information Security». http://csrc.nist.gov/publications/nistpubs/800-55-Rev1/SP800-55-rev1.pdf.
  5. The Center for Internet Security «CIS Security Metrics v1.1.0». https://benchmarks.cisecurity.org/tools2/metrics/ CIS_Security_Metrics_v1.1.0.pdf.
  6. ISACA «COBIT 5. Enabling Processes».
  7. ISACA «COBIT 5 for Information Security».
  8. ITU-T X.1208 «A cybersecurity indicator of risk to enhance confidence and security in the use of telecommunication / information and communication technologies». http://www.itu.int/rec/T-REC-X.1208-201401-I.
  9. IATAC «Measuring Cyber Security and Information Assurance». https://www.csiac.org/wp-content/uploads/2016/02/ cybersecurity.pdf.
  10. Recommendation ITU-T Y.1540. Internet protocol aspects - Quality of service and network performance. Internet protocol data communication service - IP packet transfer and availability performance parameters. http://www.itu.int/rec/T-REC-Y.1540-201607-I.
  11. Recommendation ITU-T Y.1541. Internet protocol aspects - Quality of service and network performance. Network performance objectives for IP-based services. http://www.itu.int/rec/T-REC-Y.1541-201312-I!Amd1.