EconPapers    
Economics at your fingertips  
 

An overview of Intrusion Detection within an Information System: The Improvment by Process Mining

Nkondock Mi Bahanag Nicolas and Atsa Etoundi Roger

Network and Communication Technologies, 2022, vol. 7, issue 1, 55

Abstract: Information Systems handle big amount of data within enterprises by offering the possibility to collect, treat, keep and make information avail- able. To realize these tasks, it is important to secure data from intrusions that can affect confidentiality, availability and integrity of information. Un- fortunately, with the time, technologies are more used and various types of attacks act on it to create intrusion or misuses within Information Systems. Research in intrusion detection field is still looking for solutions of such relevant problems. The purpose of this paper is to present an overview of existing intrusion detection techniques compared to a new issue based on process mining used for event logs analysis to detect abnormal events that occurs on the system. events are classified accordingly to security policy etablished with fuzzy logic to build a set of fuzzy rules, for the definition of normal and abnormal events and then reduce the high level of false alerts.

Date: 2022
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://ccsenet.org/journal/index.php/nct/article/download/0/0/47572/51013 (application/pdf)
https://ccsenet.org/journal/index.php/nct/article/view/0/47572 (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ibn:nctjnl:v:7:y:2022:i:1:p:55

Access Statistics for this article

More articles in Network and Communication Technologies from Canadian Center of Science and Education Contact information at EDIRC.
Bibliographic data for series maintained by Canadian Center of Science and Education ().

 
Page updated 2025-03-19
Handle: RePEc:ibn:nctjnl:v:7:y:2022:i:1:p:55