Abstract:
Rational counteraction to computer attacks, described as event sequences, is discussed. The approach is based on the mathematical technique of learning by precedents, formalizing similarity as a binary algebraic operation. Similarities of event sequences are analyzed. The learned classes of similarity (tolerance classes) are used to recognize computer attacks on initial steps of their life cycle. A problem-oriented resource management technology aimed at developing rational counteraction to attacks of the discussed type is presented.
Keywords:information security; data analysis; similarity as binary algebraic operation; similarity of sequences; resource management.